id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-53086
drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL Upon failure all locks need to be dropped before returning to the user. (cherry picked from commit 7d1a4258e602ffdce529f56686925034c1b3b095)
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-gmxg-c36j-9c9p
Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.5
null
null
GHSA-wprv-93r4-jj2p
OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific trees
ImpactWhen the `verifyMultiProof`, `verifyMultiProofCalldata`, `processMultiProof`, or `processMultiProofCalldata` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves.A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertently for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree.A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the [@openzeppelin/merkle-tree](https://github.com/OpenZeppelin/merkle-tree) library are safe.PatchesThe problem has been patched in 4.9.2.WorkaroundsIf you are using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the [@openzeppelin/merkle-tree](https://www.npmjs.com/package/@openzeppelin/merkle-tree) package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves.
[]
null
5.3
null
null
GHSA-cqfv-6frg-v5c7
Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.
[]
null
null
null
null
GHSA-vgj5-pm4f-q6gv
An exploit is possible where an actor with physical access can manipulate SPI flash without being detected.
[]
5.2
4.3
null
null
GHSA-87c9-j59r-8rwf
M2SOFT Report Designer Viewer 5.0 allows a Buffer Overflow with Extended Instruction Pointer (EIP) control via a crafted MRD file.
[]
null
null
7.8
null
CVE-2010-2707
Unspecified vulnerability on the HP ProCurve 2626 and 2650 switches before H.10.80 allows remote attackers to obtain sensitive information, modify data, and cause a denial of service via unknown vectors.
[ "cpe:2.3:o:hp:procurve_switch_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.02:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.03:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.31:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.32:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.41:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.45:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.46:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.50:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.53:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.54:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.55:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.07.56:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.53:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.55:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.56:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.57:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.58:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.59:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.60:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.61:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.62:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.64:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.65:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.67:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.69:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.70:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.71:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.72:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.73:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.74:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.75:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.76:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.77:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.78:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.79:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.80:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.81:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.82:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.83:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.84:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.85:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.86:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.87:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.88:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.89:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.90:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.91:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.92:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.93:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.94:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.95:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.96:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.97:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.98:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.99:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.100:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.101:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.102:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.103:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.104:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.105:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.106:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.107:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.108:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.08.109:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.21:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.22:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.23:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.24:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.25:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.26:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.27:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.28:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.29:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.30:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.31:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.32:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.33:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.35:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.36:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.37:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.38:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.39:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.40:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.41:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.42:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.43:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.44:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.45:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.46:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.47:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.48:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.49:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.50:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.51:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.52:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.53:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.54:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.55:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.56:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.57:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.58:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.59:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.60:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.61:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.62:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.63:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.64:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.65:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.66:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.67:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.68:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.69:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.70:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.71:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.72:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:h.10.73:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_2626:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_2626-pwr:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_2650:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_2650-pwr:*:*:*:*:*:*:*:*" ]
null
null
null
8.3
GHSA-2w3r-gxq2-m4qc
** DISPUTED ** PHP remote file inclusion vulnerability in adminips.php in Develooping Flash Chat allows remote attackers to execute arbitrary PHP code via a URL in the banned_file parameter. NOTE: CVE disputes this vulnerability because banned_file is set to a constant value.
[]
null
null
null
null
GHSA-7vmr-3f3w-fc3w
libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka internal bug 28166152.
[]
null
null
9.8
null
RHSA-2018:2373
Red Hat Security Advisory: redhat-certification security update
redhat-certification: resource consumption in DocumentBase:loadFiltered redhat-certification: /download allows to download any file redhat-certification: rhcertStore.py: __saveResultsFile allows to write any file
[ "cpe:/a:redhat:certifications:1::el7" ]
null
null
9.8
null
CVE-2006-1762
Directory traversal vulnerability in index.php in blur6ex 0.3.452 allows remote attackers to include arbitrary files via the shard parameter. NOTE: this issue can be exploited to produce resultant XSS when the parameter has XSS manipulations, and path disclosure with other invalid values.
[ "cpe:2.3:a:blursoft:blur6ex:0.3.462:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2009-1621
Directory traversal vulnerability in index.php in OpenCart 1.1.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the route parameter.
[ "cpe:2.3:a:opencart:opencart:1.1.8:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-cgr8-5587-cqhj
In the FPC TrustZone fingerprint App, there is a possible invalid command handler due to an exposed test feature. This could lead to local escalation of privilege in the TEE, with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-131252923
[]
null
null
null
null
CVE-2024-13317
ShipWorks Connector for Woocommerce <= 5.2.5 - Cross-Site Request Forgery to Service Password/Username Update
The ShipWorks Connector for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.5. This is due to missing or incorrect nonce validation on the 'shipworks-wordpress' page. This makes it possible for unauthenticated attackers to update the services username and password via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-m3x5-x584-4rhh
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
[]
null
9.8
null
null
GHSA-gc6f-j8xw-pvc6
Insecure inherited permissions in some Intel(R) oneMKL software before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
GHSA-x8xv-v8v3-jc5h
IBM Spectrum Scale 5.0.0.0 through 5.0.4.4 could allow a privileged authenticated user to perform unauthorized actions using a specially crated HTTP POST command. IBM X-Force ID: 179157.
[]
null
null
null
null
GHSA-ff55-4qfm-2hmv
SQL injection vulnerability in the SYS.DBMS_METADATA_UTIL package in Oracle Database 10g, and possibly earlier versions, might allow remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB05 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0260. However, there are some inconsistencies that make this unclear, and there is also a possibility that this is related to DB06, which is subsumed by CVE-2006-0259.
[]
null
null
null
null
GHSA-8cwc-g9gg-qp9w
Valor Apps Easy Folder Listing Pro has a deserialization vulnerability that allows an unauthenticated, remote attacker to execute arbitrary code with the privileges of the Joomla! application. Fixed in versions 3.8 and 4.5.
[]
9.3
9.8
null
null
GHSA-7wxw-cqg4-pq3v
Windows Mobile Broadband Driver Denial of Service Vulnerability
[]
null
6.5
null
null
GHSA-wjfc-pgfp-pv9c
Improper Input Validation in nyholm/psr7
ImpactImproper header parsing. An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`.PatchesThe issue is patched in 1.6.1.WorkaroundsThere are no known workarounds.Referenceshttps://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
[]
null
5.3
null
null
GHSA-j9rq-gcmr-fp62
A vulnerability was found in Bdtask Hospital AutoManager up to 20240227 and classified as problematic. This issue affects some unknown processing of the file /prescription/prescription/delete/ of the component Prescription Page. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
3.8
null
null
GHSA-mf6m-m52m-43jc
Password recovery vulnerability in SICK SIM1004 Partnumber 1098148 with firmware version < 2.0.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to a increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 2.0.0 as soon as possible.
[]
null
9.8
null
null
CVE-2021-39480
Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS).
[ "cpe:2.3:a:bingrep_project:bingrep:0.8.5:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2006-3990
Multiple PHP remote file inclusion vulnerabilities in Paul M. Jones Savant2, possibly when used with the com_mtree component for Mambo and Joomla!, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) Savant2_Plugin_stylesheet.php, (2) Savant2_Compiler_basic.php, (3) Savant2_Error_pear.php, (4) Savant2_Error_stack.php, (5) Savant2_Filter_colorizeCode.php, (6) Savant2_Filter_trimwhitespace.php, (7) Savant2_Plugin_ahref.php, (8) Savant2_Plugin_ahrefcontact.php, (9) Savant2_Plugin_ahreflisting.php, (10) Savant2_Plugin_ahreflistingimage.php, (11) Savant2_Plugin_ahrefmap.php, (12) Savant2_Plugin_ahrefownerlisting.php, (13) Savant2_Plugin_ahrefprint.php, (14) Savant2_Plugin_ahrefrating.php, (15) Savant2_Plugin_ahrefrecommend.php, (16) Savant2_Plugin_ahrefreport.php, (17) Savant2_Plugin_ahrefreview.php, (18) Savant2_Plugin_ahrefvisit.php, (19) Savant2_Plugin_checkbox.php, (20) Savant2_Plugin_cycle.php, (21) Savant2_Plugin_dateformat.php, (22) Savant2_Plugin_editor.php, (23) Savant2_Plugin_form.php, (24) Savant2_Plugin_image.php, (25) Savant2_Plugin_input.php, (26) Savant2_Plugin_javascript.php, (27) Savant2_Plugin_listalpha.php, (28) Savant2_Plugin_listingname.php, (29) Savant2_Plugin_modify.php, (30) Savant2_Plugin_mtpath.php, (31) Savant2_Plugin_options.php, (32) Savant2_Plugin_radios.php, (33) Savant2_Plugin_rating.php, or (34) Savant2_Plugin_textarea.php.
[ "cpe:2.3:a:phpsavant:savant2:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2j3c-jv49-w6c7
A large loop in JBIG2Stream::readSymbolDictSeg in xpdf 4.00 allows an attacker to cause denial of service via a specific file due to inappropriate decoding.
[]
null
null
5.5
null
RHSA-2021:2778
Red Hat Security Advisory: OpenJDK 8u302 Security Update for Portable Linux Builds
OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
7.5
null
null
CVE-2023-28122
A local privilege escalation (LPE) vulnerability in UI Desktop for Windows (Version 0.59.1.71 and earlier) allows a malicious actor with local access to a Windows device running said application to submit arbitrary commands as SYSTEM.This vulnerability is fixed in Version 0.62.3 and later.
[ "cpe:2.3:a:ui:desktop:*:*:*:*:*:windows:*:*" ]
null
7.8
null
null
GHSA-78h4-h9x2-x5x9
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetMacAccessMode.
[]
null
7.8
null
null
CVE-2023-48834
A lack of rate limiting in pjActionAjaxSend in Car Rental v3.0 allows attackers to cause resource exhaustion.
[ "cpe:2.3:a:phpjabbers:car_rental_script:3.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-mmm4-3c29-g9r6
PHP Scripts Mall Student Profile Management System Script v2.0.6 has XSS via the Name field to list_student.php.
[]
null
null
5.4
null
GHSA-w8qw-x88f-f35r
The Symantec Encryption Management Server (SEMS) product, prior to version 3.4.2 MP1, may be susceptible to a denial of service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network.
[]
null
null
7.5
null
CVE-2025-46035
Buffer Overflow vulnerability in Tenda AC6 v.15.03.05.16 allows a remote attacker to cause a denial of service via the oversized schedStartTime and schedEndTime parameters in an unauthenticated HTTP GET request to the /goform/openSchedWifi endpoint
[]
null
7.5
null
null
GHSA-wqc4-2cj5-89rj
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
[]
null
null
null
null
CVE-2022-35484
OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6b6a8f.
[ "cpe:2.3:a:otfcc_project:otfcc:0.10.4:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-hjrc-qggq-2w49
ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request.
[]
null
null
9.8
null
GHSA-cv8p-r9gw-9x34
In Gxlcms QY v1.0.0713, the update function in Lib\Lib\Action\Admin\TplAction.class.php allows remote attackers to execute arbitrary PHP code by placing this code into a template.
[]
null
null
9.8
null
CVE-2021-32095
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.
[ "cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*" ]
null
8.1
null
5.5
CVE-2021-33660
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated FLI file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
cisco-sa-sb-rv34x-rce-8bfG2h6b
Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code with elevated privileges equivalent to the web service process on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
6.3
null
null
CVE-2022-4539
Web Application Firewall <= 2.1.2 - IP Address Spoofing to Protection Mechanism Bypass
The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
[ "cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:*:*:*", "cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
GHSA-gcqp-jx79-4gc5
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege.
[]
null
null
7.1
null
GHSA-qqpc-gc88-ff86
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
[]
null
5.9
null
null
PYSEC-2021-531
null
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
CVE-2024-36506
An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection.
[]
null
3.5
null
null
CVE-2024-4253
Command Injection in gradio-app/gradio
A command injection vulnerability exists in the gradio-app/gradio repository, specifically within the 'test-functional.yml' workflow. The vulnerability arises due to improper neutralization of special elements used in a command, allowing for unauthorized modification of the base repository or secrets exfiltration. The issue affects versions up to and including '@gradio/[email protected]'. The flaw is present in the workflow's handling of GitHub context information, where it echoes the full name of the head repository, the head branch, and the workflow reference without adequate sanitization. This could potentially lead to the exfiltration of sensitive secrets such as 'GITHUB_TOKEN', 'COMMENT_TOKEN', and 'CHROMATIC_PROJECT_TOKEN'.
[ "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:*:*:*" ]
null
null
7.5
null
PYSEC-2020-223
null
In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2.
[]
null
null
null
null
CVE-2005-2839
Multiple cross-site scripting (XSS) vulnerabilities in MAXdev MD-Pro 1.0.72 allow remote attackers to inject arbitrary web script or HTML via (1) dl-search.php or (2) wl-search.php.
[ "cpe:2.3:a:maxdev:md-pro:1.0.72:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2005-3158
SQL injection vulnerability in messages.php in PHP-Fusion 6.00.106 and 6.00.107 allows remote attackers to execute arbitrary SQL commands via the (1) pm_email_notify and (2) pm_save_sent parameters, a different vulnerability than CVE-2005-3157 and CVE-2005-3159.
[ "cpe:2.3:a:php_fusion:php_fusion:6.00.106:*:*:*:*:*:*:*", "cpe:2.3:a:php_fusion:php_fusion:6.00.107:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-52m2-7hr5-3fp9
SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to craft a link, which when clicked by an unsuspecting user can be used to redirect a user to a malicious site which could read or modify some sensitive information or expose the victim to a phishing attack.
[]
null
6.1
null
null
GHSA-wjp7-rcvr-7wq6
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
null
null
GHSA-2x8v-355v-69p5
The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data.
[]
null
null
null
null
GHSA-fqg8-8594-3gf8
The which_access variable for Majordomo 2.0 through 1.94.4, and possibly earlier versions, is set to "open" by default, which allows remote attackers to identify the email addresses of members of mailing lists via a "which" command.
[]
null
null
null
null
CVE-2014-2160
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745.
[ "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*" ]
null
null
null
7.8
cisco-sa-broadworks-xss-xbhfr4cD
Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.1
null
null
CVE-2020-16994
Azure Sphere Unsigned Code Execution Vulnerability
Azure Sphere Unsigned Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
GHSA-v6pv-cmg8-x43p
For the NVIDIA Quadro, NVS, and GeForce products, improper sanitization of parameters in the NVAPI support layer causes a denial of service vulnerability (blue screen crash) within the NVIDIA Windows graphics drivers.
[]
null
null
6.6
null
RHSA-2014:1009
Red Hat Security Advisory: samba4 security update
samba: Uninitialized memory exposure samba: nmbd denial of service samba: smbd unicode path names denial of service samba: remote code execution in nmbd
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2012-0101
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.
[ "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-hcc9-635h-2qg5
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
[]
null
8.8
null
null
CVE-2018-21138
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D3600 before 1.0.0.76 and D6000 before 1.0.0.76.
[ "cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-h2c5-wxjr-xfwc
Vulnerability of parameter type not being verified in the WantAgent module Impact: Successful exploitation of this vulnerability may affect availability.
[]
null
6.2
null
null
CVE-2015-2109
Unspecified vulnerability in HP Operations Orchestration 10.x allows remote attackers to bypass authentication, and obtain sensitive information or modify data, via unknown vectors.
[ "cpe:2.3:a:hp:operations_orchestration:10.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-37002
Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `E-RAB Modification Indication` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.
[]
null
5.3
null
null
CVE-2019-14247
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
[ "cpe:2.3:a:mpg321_project:mpg321:0.3.2:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2021-4063
Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-7rq3-6hvw-rrqj
Buffer overflow in the ABWOutputDev::endWord function in poppler/ABWOutputDev.cc in Poppler (aka libpoppler) 0.10.6, 0.12.0, and possibly other versions, as used by the Abiword pdftoabw utility, allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PDF file.
[]
null
null
null
null
CVE-2023-49794
The logic of get apk path in KernelSU module can be bypassed
KernelSU is a Kernel-based root solution for Android devices. In versions 0.7.1 and prior, the logic of get apk path in KernelSU kernel module can be bypassed, which causes any malicious apk named `me.weishu.kernelsu` get root permission. If a KernelSU module installed device try to install any not checked apk which package name equal to the official KernelSU Manager, it can take over root privileges on the device. As of time of publication, a patched version is not available.
[ "cpe:2.3:a:kernelsu:kernelsu:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2002-0247
Buffer overflows in wmtv 0.6.5 and earlier may allow local users to gain privileges.
[ "cpe:2.3:a:wliang:wmtv:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2021-2241
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iStore. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle iStore accessible data as well as unauthorized access to critical data or complete access to all Oracle iStore accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:istore:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2023-40130
In onBindingDied of CallRedirectionProcessor.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege and background activity launch with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2014-9046
The OC_Util::getUrlContent function in ownCloud Server before 5.0.18, 6.x before 6.0.6, and 7.x before 7.0.3 allows remote attackers to read arbitrary files via a file:// protocol.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:7.0.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-7x8x-8m23-mfwj
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
CVE-2012-0451
CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.
[ "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-33439
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c.
[ "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-2983-rc95-vrc7
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Valhall GPU Firmware, Arm Ltd Arm 5th Gen GPU Architecture Firmware allows a local non-privileged user to make improper GPU processing operations to access a limited amount outside of buffer bounds. If the operations are carefully prepared, then this in turn could give them access to all system memory. This issue affects Valhall GPU Firmware: from r29p0 through r46p0; Arm 5th Gen GPU Architecture Firmware: from r41p0 through r46p0.
[]
null
7.8
null
null
CVE-2017-1498
IBM Connections 5.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 129020.
[ "cpe:2.3:a:ibm:connections:5.5.0.0:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2016-9366
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication.
[ "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*" ]
null
null
9.8
5
cisco-sa-ftd-archive-bypass-z4wQjwcN
Cisco Firepower Threat Defense Software Encrypted Archive File Policy Bypass Vulnerability
A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the May 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75298"].
[]
null
5.8
null
null
CVE-2022-2224
The WordPress plugin Gallery for Social Photo is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.0.0.27 due to failure to properly check for the existence of a nonce in the function gifeed_duplicate_feed. This make it possible for unauthenticated attackers to duplicate existing posts or pages granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:ghozylab:gallery_for_social_photo:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-g4c9-qfvw-fmr4
TYPO3 Cross-Site Scripting in Backend Modal Component
Failing to properly encode user input, notifications shown in modal windows in the TYPO3 backend are vulnerable to cross-site scripting. A valid backend user account is needed in order to exploit this vulnerability.
[]
null
6.1
null
null
GHSA-cg57-h35j-g58g
getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device.
[]
null
null
7.5
null
CVE-2022-40695
WordPress SEO Redirection Plugin plugin <= 8.9 - Multiple Cross-Site Scripting (CSRF) vulnerabilities
Multiple Cross-Site Scripting (CSRF) vulnerabilities in SEO Redirection Plugin plugin <= 8.9 on WordPress.
[ "cpe:2.3:a:clogica:seo_redirection:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-gjhp-fhfw-fvx3
The Bluetooth Classic implementation in Silicon Labs iWRAP 6.3.0 and earlier does not properly handle the reception of an oversized LMP packet greater than 17 bytes, allowing attackers in radio range to trigger a crash in WT32i via a crafted LMP packet.
[]
null
null
null
null
GHSA-9q3g-98q9-cpqq
Wireshark 1.8.x before 1.8.4 allows remote attackers to obtain sensitive hostname information by reading pcap-ng files.
[]
null
null
null
null
CVE-2022-28005
An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482.
[ "cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*" ]
null
9.8
null
5
GHSA-gxq8-qw7q-mh32
In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host.
[]
null
null
null
null
GHSA-m86c-6g87-95pq
Incorrect Privilege Assignment vulnerability in opentext Fortify ScanCentral DAST. The vulnerability could be exploited to gain elevated privileges.This issue affects Fortify ScanCentral DAST versions 21.1, 21.2, 21.2.1, 22.1, 22.1.1, 22.2, 23.1.
[]
null
8.2
null
null
GHSA-j45j-gj3g-pr93
A vulnerability was found in coderd-repos Eva 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /system/traceLog/page of the component HTTP POST Request Handler. The manipulation of the argument property leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250124.
[]
null
5.5
null
null
RHSA-2018:0379
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update
Core: Improper processing of XML documents can cause a denial of service
[ "cpe:/a:redhat:rhel_dotnet:1.0::el7", "cpe:/a:redhat:rhel_dotnet:1.1::el7", "cpe:/a:redhat:rhel_dotnet:2.0::el7" ]
null
null
5.3
null
CVE-2024-53702
Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.
[ "cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-hxwf-hgxf-ghjj
Opera does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."
[]
null
null
null
null
CVE-2014-7898
The OLE Point of Sale (OPOS) drivers before 1.13.003 on HP Point of Sale Windows PCs allow remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:hp:ole_point_of_sale_driver:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-f235-r39g-2m8r
Firefox 1.0 does not prevent the user from dragging an executable file to the desktop when it has an image/gif content type but has a dangerous extension such as .bat or .exe, which allows remote attackers to bypass the intended restriction and execute arbitrary commands via malformed GIF files that can still be parsed by the Windows batch file parser, aka "firedragging."
[]
null
null
null
null
GHSA-7px9-8jq2-c4vv
The kento-post-view-counter plugin through 2.8 for WordPress has XSS via kento_pvc_geo.
[]
null
null
null
null
CVE-2013-1999
Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
[ "cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2006-7058
Multiple cross-site scripting (XSS) vulnerabilities in Sphider before 1.3.1c allow remote attackers to inject arbitrary web script or HTML via the catid parameter to (1) templates/standard/search_form.html and (2) templates/dark/search_form.html. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:sphider:sphider:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-22426
Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise.
[ "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-mwrq-v3xr-mmc9
In updateInfo of android_hardware_input_InputApplicationHandle.cpp, there is a possible control of code flow due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174768985
[]
null
null
null
null