id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-39275 | Advantech ADAM-5630 Use of Persistent Cookies Containing Sensitive Information | Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a
session is closed. Forging requests with a legitimate cookie, even if
the session was terminated, allows an unauthorized attacker to act with
the same level of privileges of the legitimate user. | [
"cpe:2.3:o:advantech:adam-5630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:adam-5630:-:*:*:*:*:*:*:*"
] | 8.5 | 8 | null | null |
GHSA-vqcm-7f7f-r539 | brbackup exposes database password to unauthorized users | lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process. | [] | null | null | 7.8 | null |
GHSA-g3xw-9j5v-qg2m | IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 199149. | [] | null | 3.3 | null | null |
|
CVE-2005-3039 | SQL injection vulnerability in infopage.asp in Mall23 eCommerce allows remote attackers to execute arbitrary SQL commands via the idPage parameter. | [
"cpe:2.3:a:mall23:mall23:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-mwr3-wmhx-fgmh | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Business Interlinks. | [] | null | null | null | null |
|
GHSA-mrm4-w3x4-3rhq | Cross-site scripting (XSS) vulnerability in SilverStripe 2.3.x before 2.3.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to DataObjectSet pagination. | [] | null | null | null | null |
|
RHSA-2023:7288 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update | snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 7.5 | null | null |
CVE-2015-0420 | Unspecified vulnerability in the Oracle Forms component in Oracle Fusion Middleware 11.1.1.7 and 11.1.2.2 allows remote attackers to affect confidentiality via unknown vectors related to Forms Services. | [
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-mvw7-hx6m-rj9c | Artica Pandora FMS version 7.0 leaks a full installation pathname via GET data when intercepting the main page's graph requisition. This also implies that general OS information is leaked (e.g., a /var/www pathname typically means Linux or UNIX). | [] | null | null | 6.5 | null |
|
GHSA-j2rh-9hjf-9v46 | A vulnerability was found in code-projects Police Station Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function criminal::remove of the file source.cpp of the component Delete Record. The manipulation of the argument No leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. | [] | 4.8 | 5.3 | null | null |
|
CVE-2011-3969 | Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to layout of SVG documents. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2019-9494 | The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side-channel attacks | The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected. | [
"cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:radius_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
CVE-2023-52577 | dccp: fix dccp_v4_err()/dccp_v6_err() again | In the Linux kernel, the following vulnerability has been resolved:
dccp: fix dccp_v4_err()/dccp_v6_err() again
dh->dccph_x is the 9th byte (offset 8) in "struct dccp_hdr",
not in the "byte 7" as Jann claimed.
We need to make sure the ICMP messages are big enough,
using more standard ways (no more assumptions).
syzbot reported:
BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]
BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline]
BUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94
pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]
pskb_may_pull include/linux/skbuff.h:2681 [inline]
dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94
icmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867
icmpv6_rcv+0x19d5/0x30d0
ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438
ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
NF_HOOK include/linux/netfilter.h:304 [inline]
ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
dst_input include/net/dst.h:468 [inline]
ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79
NF_HOOK include/linux/netfilter.h:304 [inline]
ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310
__netif_receive_skb_one_core net/core/dev.c:5523 [inline]
__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637
netif_receive_skb_internal net/core/dev.c:5723 [inline]
netif_receive_skb+0x58/0x660 net/core/dev.c:5782
tun_rx_batched+0x83b/0x920
tun_get_user+0x564c/0x6940 drivers/net/tun.c:2002
tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
call_write_iter include/linux/fs.h:1985 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x8ef/0x15c0 fs/read_write.c:584
ksys_write+0x20f/0x4c0 fs/read_write.c:637
__do_sys_write fs/read_write.c:649 [inline]
__se_sys_write fs/read_write.c:646 [inline]
__x64_sys_write+0x93/0xd0 fs/read_write.c:646
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
Uninit was created at:
slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767
slab_alloc_node mm/slub.c:3478 [inline]
kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523
kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559
__alloc_skb+0x318/0x740 net/core/skbuff.c:650
alloc_skb include/linux/skbuff.h:1286 [inline]
alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313
sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795
tun_alloc_skb drivers/net/tun.c:1531 [inline]
tun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846
tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
call_write_iter include/linux/fs.h:1985 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x8ef/0x15c0 fs/read_write.c:584
ksys_write+0x20f/0x4c0 fs/read_write.c:637
__do_sys_write fs/read_write.c:649 [inline]
__se_sys_write fs/read_write.c:646 [inline]
__x64_sys_write+0x93/0xd0 fs/read_write.c:646
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
CPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-q828-mj7r-jwwf | A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/voters_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225933 was assigned to this vulnerability. | [] | null | 7.5 | null | null |
|
GHSA-2vc6-9c9h-vvhf | IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program. | [] | null | 6.7 | null | null |
|
RHSA-2023:0048 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.1 | null | null |
CVE-2008-0269 | Unspecified vulnerability in the dotoprocs function in Sun Solaris 10 allows local users to cause a denial of service (panic) via unspecified vectors. | [
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-fwwv-x7hh-wmpw | Implicit intent hijacking vulnerability in IAP of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. | [] | null | 5.5 | null | null |
|
RHSA-2023:1630 | Red Hat Security Advisory: Satellite 6.12.3 Async Security Update | postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions | [
"cpe:/a:redhat:satellite:6.12::el8",
"cpe:/a:redhat:satellite_capsule:6.12::el8",
"cpe:/a:redhat:satellite_maintenance:6.12::el8",
"cpe:/a:redhat:satellite_utils:6.12::el8"
] | null | 5.5 | null | null |
CVE-2021-43293 | Sonatype Nexus Repository Manager 3.x before 3.36.0 allows a remote authenticated attacker to potentially perform network enumeration via Server Side Request Forgery (SSRF). | [
"cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-x5rv-46w7-9492 | QuickTime in Apple Mac OS X before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG2000 image. | [] | null | null | null | null |
|
CVE-2008-0999 | Apple Mac OS X 10.5.2 allows user-assisted attackers to cause a denial of service (crash) via a crafted Universal Disc Format (UDF) disk image, which triggers a NULL pointer dereference. | [
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-382v-24ph-q459 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
CVE-2011-5179 | Cross-site scripting (XSS) vulnerability in skysa-official/skysa.php in Skysa App Bar Integration plugin, possibly before 1.04, for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. | [
"cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3w87-pggf-mwm8 | An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0783. | [] | null | null | null | null |
|
GHSA-9354-f967-7fw8 | WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source. | [] | null | null | null | null |
|
CVE-2024-44947 | fuse: Initialize beyond-EOF page contents before setting uptodate | In the Linux kernel, the following vulnerability has been resolved:
fuse: Initialize beyond-EOF page contents before setting uptodate
fuse_notify_store(), unlike fuse_do_readpage(), does not enable page
zeroing (because it can be used to change partial page contents).
So fuse_notify_store() must be more careful to fully initialize page
contents (including parts of the page that are beyond end-of-file)
before marking the page uptodate.
The current code can leave beyond-EOF page contents uninitialized, which
makes these uninitialized page contents visible to userspace via mmap().
This is an information leak, but only affects systems which do not
enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the
corresponding kernel command line parameter). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-41018 | Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no vpn basic protocol (l2tp|pptp) name WORD server WORD username WORD passsword WORD firmwall (on|off) defroute (on|off) localip A.B.C.D' command template. | [
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
CVE-2020-16144 | When using an object storage like S3 as the file store, when a user creates a public link to a folder where anonymous users can upload files, and another user uploads a virus the files antivirus app would detect the virus but fails to delete it due to permission issues. This affects the files_antivirus component versions before 0.15.2 for ownCloud. | [
"cpe:2.3:a:owncloud:files_antivirus:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | 3.5 |
|
CVE-2010-0426 | sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory. | [
"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2015-0106 | Cross-site scripting (XSS) vulnerability in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 through 8.5.5.0 and WebSphere Lombardi Edition (WLE) 7.2.x through 7.2.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:websphere_application_server:7.1:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2.0.1:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2.0.2:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2.0.3:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2.0.4:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.2.0.5:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-f34q-hm3j-vf93 | A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The Generic Data Mapper, the Engineering Adapter, and the Engineering Interface improperly handle XML External Entity (XXE) entries when parsing configuration and mapping files. This could allow an attacker to extract any file with a known location on the user's system or accessible network folders by persuading a user to use a maliciously crafted configuration or mapping file in one of the affected components. | [] | 5.7 | 5.5 | null | null |
|
CVE-2022-46096 | A Cross site scripting (XSS) vulnerability in Sourcecodester Online Covid-19 Directory on Vaccination System v1.0 allows attackers to execute arbitrary code via the txtfullname parameter or txtphone parameter to register.php without logging in. | [
"cpe:2.3:a:covid-19_directory_on_vaccination_system_project:covid-19_directory_on_vaccination_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
PYSEC-2021-813 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [] | null | null | null | null |
GHSA-wqw5-fg63-857m | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] | null | 7.5 | null | null |
|
GHSA-q62p-v3wf-j428 | Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. | [] | null | null | null | null |
|
CVE-2016-10632 | apk-parser2 is a module which extracts Android Manifest info from an APK file. apk-parser2 downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:apk-parser2_project:apk-parser2:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 9.3 |
|
CVE-2004-0490 | cPanel, when compiling Apache 1.3.29 and PHP with the mod_phpsuexec option, does not set the --enable-discard-path option, which causes php to use the SCRIPT_FILENAME variable to find and execute a script instead of the PATH_TRANSLATED variable, which allows local users to execute arbitrary PHP code as other users via a URL that references the attacker's script after the user's script, which executes the attacker's script with the user's privileges, a different vulnerability than CVE-2004-0529. | [
"cpe:2.3:a:cpanel:cpanel:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4.2_stable_48:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:9.1.0_r85:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2022:0274 | Red Hat Security Advisory: polkit security update | polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability. | [
"cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 |
|
CVE-2025-4573 | LDAP Injection in Mattermost Enterprise Edition When Using Active Directory | Mattermost versions 10.7.x <= 10.7.1, 10.6.x <= 10.6.3, 10.5.x <= 10.5.4, 9.11.x <= 9.11.13 fail to properly validate LDAP group ID attributes, allowing an authenticated administrator with PermissionSysconsoleWriteUserManagementGroups permission to execute LDAP search filter injection via the PUT /api/v4/ldap/groups/{remote_id}/link API when objectGUID is configured as the Group ID Attribute. | [] | null | 4.1 | null | null |
CVE-2024-13858 | BuddyBoss Platform and BuddyBoss Theme <= Multiple Versions - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'invitee_name' | The BuddyBoss Platform plugin and BuddyBoss Theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘invitee_name’ parameter in all versions up to, and including, 2.8.50 and 2.8.41, respectively, due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in the BuddyBoss Platform plugin in version 2.8.41. | [] | null | 6.4 | null | null |
CVE-2020-3440 | Cisco Webex Meetings Desktop App for Windows Arbitrary File Overwrite Vulnerability | A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to improper validation of URL parameters that are sent from a website to the affected application. An attacker could exploit this vulnerability by persuading a user to follow a URL to a website that is designed to submit crafted input to the affected application. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system, possibly corrupting or deleting critical system files. | [
"cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:windows:*:*"
] | null | null | 6.5 | null |
CVE-2024-47103 | IBM Sterling B2B Integrator cross-site scripting | IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.5:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.3:*:*:*:standard:*:*:*"
] | null | 4.8 | null | null |
GHSA-pf85-6vfc-9453 | BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed. | [] | null | 6.5 | null | null |
|
CVE-2023-41276 | QTS, QuTS hero, QuTScloud | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.2.2533 build 20230926 and later
QuTS hero h5.1.2.2534 build 20230927 and later
QuTScloud c5.1.5.2651 and later
| [
"cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.2.2533:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2017-9285 | Login restrictions not applied when using ebaclient against NetIQ eDirectory EBA interface | NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when "ebaclient" was used, allowing unpermitted access to eDirectory services. | [
"cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:9.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:9.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:9.0:sp3:*:*:*:*:*:*"
] | null | null | 5.4 | null |
CVE-2020-26135 | Live Helper Chat before 3.44v allows reflected XSS via the setsettingajax PATH_INFO. | [
"cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-g2p3-wp5v-j757 | Cisco NX-OS 7.0(1)N1(1), 7.0(1)N1(3), and 7.0(4)N1(1) on Nexus 2000 Fabric Extender devices has a blank root password, which allows local users to gain privileges via unspecified vectors, aka Bug ID CSCur22079. | [] | null | null | 9.8 | null |
|
CVE-2022-24837 | Enumerable upload file names in hedgedoc | HedgeDoc is an open-source, web-based, self-hosted, collaborative markdown editor. Images uploaded with HedgeDoc version 1.9.1 and later have an enumerable filename after the upload, resulting in potential information leakage of uploaded documents. This is especially relevant for private notes and affects all upload backends, except Lutim and imgur. This issue is patched in version 1.9.3 by replacing the filename generation with UUIDv4. If you cannot upgrade to HedgeDoc 1.9.3, it is possible to block POST requests to `/uploadimage`, which will disable future uploads. | [
"cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2025-21490 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
CVE-2015-5889 | rsh in the remote_cmds component in Apple OS X before 10.11 allows local users to obtain root privileges via vectors involving environment variables. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2022-21807 | Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
RHSA-2025:9309 | Red Hat Security Advisory: gimp:2.8 security update | gimp: GIMP ICO File Parsing Integer Overflow gimp: Multiple heap buffer overflows in TGA parser gimp: Multiple use after free in XCF parser | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.3 | null | null |
CVE-2023-40511 | LG Simple Editor checkServer Authentication Bypass Vulnerability | LG Simple Editor checkServer Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the checkServer method. The issue results from the exposure of plaintext credentials. An attacker can leverage this vulnerability to bypass authentication on the system.
. Was ZDI-CAN-20013. | [
"cpe:2.3:a:lg:simple_editor:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
CVE-2018-11072 | Dell Digital Delivery versions prior to 3.5.1 contain a DLL Injection Vulnerability. A local authenticated malicious user with advance knowledge of the application workflow could potentially load and execute a malicious DLL with administrator privileges. | [
"cpe:2.3:a:dell:digital_delivery:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-pqw8-9r2r-p4cp | A vulnerability in the MIME message handling of the Notes client (versions 9 and 10) could potentially be exploited by an unauthenticated attacker resulting in a stack buffer overflow. This could allow a remote attacker to crash the client or inject code into the system which would execute with the privileges of the client. | [] | null | null | null | null |
|
CVE-2022-20135 | In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2020-1832 | E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution. | [
"cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp1c233\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 |
|
CVE-2017-14880 | In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, while IPA WAN-driver is processing multiple requests from modem/user-space module, the global variable "num_q6_rule" does not have a mutex lock and thus can be accessed and modified by multiple threads. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
RHSA-2011:1167 | Red Hat Security Advisory: seamonkey security update | Mozilla: Miscellaneous memory safety hazards Mozilla: Private data leakage using RegExp.input | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2023-35348 | Active Directory Federation Service Security Feature Bypass Vulnerability | Active Directory Federation Service Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2020-3952 | Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls. | [
"cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 |
|
GHSA-v292-qccp-5g6f | The Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] | null | 4.4 | null | null |
|
CVE-2011-2411 | Unspecified vulnerability on HP NonStop Servers with software H06.x through H06.23.00 and J06.x through J06.12.00, when Samba is used, allows remote authenticated users to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:nonstop_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.15.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.15.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.16.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.16.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.16.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.17.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.17.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.17.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.17.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.18.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.18.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.18.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.19.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.19.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.19.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.19.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.20.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.20.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.20.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.20.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.21.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.21.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.21.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.22.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.22.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:h06.23.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.04.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.04.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.04.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.05.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.05.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.05.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.06.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.06.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.06.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.06.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.07.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.07.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.07.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.08.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.08.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.08.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.08.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.09.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.09.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.09.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.09.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.10.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:nonstop_server_software:j06.12.00:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-8jhg-88f8-qqj6 | A vulnerability classified as problematic was found in Campcodes Complete Online Student Management System 1.0. Affected by this vulnerability is an unknown functionality of the file academic_year_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259903. | [] | null | 3.5 | null | null |
|
CVE-2022-23571 | Reachable Assertion in Tensorflow | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-v4f5-j5hc-8mj3 | Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application. | [] | null | 5.3 | null | null |
|
GHSA-99h4-3x4g-cr3g | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2021-29753 | IBM Business Automation Workflow 18. 19, 20, 21, and IBM Business Process Manager 8.5 and d8.6 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. | [
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:19.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:-:*:*:*"
] | null | null | 5.9 | null |
|
CVE-2017-18369 | The Billion 5200W-T 1.02b.rc5.dt49 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the adv_remotelog.asp page and can be exploited through the syslogServerAddr parameter. | [
"cpe:2.3:o:billion:5200w-t_firmware:1.02b:rc5.dt49:*:*:*:*:*:*",
"cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2018-3809 | Information exposure through directory listings in serve 6.5.3 allows directory listing and file access even when they have been set to be ignored. | [
"cpe:2.3:a:zeit:serve:6.5.3:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2021-22491 | There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. | [
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-6w39-p77c-pmpq | A vulnerability was found in code-projects School Fees Payment System 1.0. It has been classified as critical. This affects an unknown part of the file /ajx.php. The manipulation of the argument name_startsWith leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 2.1 | 6.3 | null | null |
|
GHSA-pv6j-85rr-wr2m | A vulnerability has been identified in NX (All versions < V2406.3000). The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process. | [] | 7.3 | 7.8 | null | null |
|
GHSA-x882-2fxr-xrcj | The Books & Papers WordPress plugin through 0.20210223 does not escape its Custom DB prefix settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | [] | null | 4.8 | null | null |
|
GHSA-qmjg-23p5-mqr3 | An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called relay.sh which is used for creating new SSH relays for the device so that the device connects to Vera servers. All the parameters passed in this specific script are logged to a log file called log.relay in the /tmp folder. The user can also read all the log files from the device using a script called log.sh. However, when the script loads the log files it displays them with content-type text/html and passes all the logs through the ansi2html binary which converts all the character text including HTML meta-characters correctly to be displayed in the browser. This allows an attacker to use the log files as a storing mechanism for the XSS payload and thus whenever a user navigates to that log.sh script, it enables the XSS payload and allows an attacker to execute his malicious payload on the user's browser. | [] | null | null | 5.4 | null |
|
CVE-2009-3221 | Stack-based buffer overflow in Audio Lib Player (ALP) allows remote attackers to execute arbitrary code via a long URL in a .m3u playlist file. | [
"cpe:2.3:a:basicunivers.free.fr:audio_lib_player:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2022-22610 | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to code execution. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2023-0851 | Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe. | [
"cpe:2.3:o:canon:mf642cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf644cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf741cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf743cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf745cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp621c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp621c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp661c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp661c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp662c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp662c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf262dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf262dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf264dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf264dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf267dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf267dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_vp_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_vp_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf272dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf272dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf273dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf273dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf275dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf275dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf746cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp122dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp122dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g3270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g3270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g4270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g4270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx3020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx3020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx4020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp621cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp621cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp633cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp633cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp664cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp664cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf643cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf643cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf645cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf645cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf742cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf742cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf744cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf744cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf746cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf746cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127if_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127p:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2011-0253 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2018:2737 | Red Hat Security Advisory: mod_perl security update | mod_perl: arbitrary Perl code execution in the context of the user account via a user-owned .htaccess | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.3 | null |
CVE-2021-34362 | Command Injection Vulnerability in Media Streaming Add-on | A command injection vulnerability has been reported to affect QNAP device running Media Streaming add-on. If exploited, this vulnerability allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of Media Streaming add-on: QTS 5.0.0: Media Streaming add-on 500.0.0.3 ( 2021/08/20 ) and later QTS 4.5.4: Media Streaming add-on 500.0.0.3 ( 2021/08/20 ) and later QTS 4.3.6: Media Streaming add-on 430.1.8.12 ( 2021/08/20 ) and later QTS 4.3.3: Media Streaming add-on 430.1.8.12 ( 2021/09/29 ) and later QuTS-Hero 5.0.0: Media Streaming add-on 500.0.0.3 ( 2021/08/20 ) and later | [
"cpe:2.3:a:qnap:media_streaming_add-on:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.3:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.0.0:*:*:*:*:*:*:*"
] | null | 8.7 | null | null |
GHSA-86qr-9vqc-pgc6 | Code execution in Spring Integration | Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code. | [] | null | 9.8 | null | null |
GHSA-mgc5-697q-9jc6 | A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link. | [] | null | null | 5.4 | null |
|
CVE-2019-16127 | Atmel Advanced Software Framework (ASF) 4 has an Integer Overflow. | [
"cpe:2.3:a:microchip:advanced_software_framework_4:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
CVE-2012-6464 | Cross-site scripting (XSS) vulnerability in Opera before 12.10 allows remote attackers to inject arbitrary web script or HTML via crafted JavaScript code that overrides methods of unspecified native objects in documents that have different origins. | [
"cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.20:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.52.1100:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.65:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.66:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.02:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cv5g-f88q-2vr3 | An issue in the delete function in the MenuController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete menus created by the Administrator. | [] | null | 4.3 | null | null |
|
CVE-2021-1394 | Cisco IOS XE Software for Network Convergence System 520 Routers Denial of Service Vulnerability | A vulnerability in the ingress traffic manager of Cisco IOS XE Software for Cisco Network Convergence System (NCS) 520 Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the web management interface of an affected device. This vulnerability is due to incorrect processing of certain IPv4 TCP traffic that is destined to an affected device. An attacker could exploit this vulnerability by sending a large number of crafted TCP packets to the affected device. A successful exploit could allow the attacker to cause the web management interface to become unavailable, resulting in a DoS condition. Note: This vulnerability does not impact traffic that is going through the device or going to the Management Ethernet interface of the device. | [
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-hx5j-2h8c-m9mc | MEDHOST Document Management System contains hard-coded credentials that are used for Apache Solr access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with Apache Solr may be able to obtain or modify sensitive patient and financial information. The Apache Solr account name is dms. The password is hard-coded throughout the application, and is the same across all installations. Customers do not have the option to change passwords. The dms account for Apache Solr has access to all indexed patient documents. | [] | null | null | 9.1 | null |
|
CVE-2004-1419 | PHP remote file inclusion vulnerability in ZeroBoard 4.1pl4 and earlier allows remote attackers to execute arbitrary PHP code by modifying the (1) _zb_path parameter to outlogin.php or (2) dir parameter to write.php to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2016-10107 | Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 index.php page via a modified Cookie header. | [
"cpe:2.3:a:western_digital:mycloud_nas:2.11.142:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2024-27848 | This issue was addressed with improved permissions checking. This issue is fixed in macOS Sonoma 14.5, iOS 17.5 and iPadOS 17.5. A malicious app may be able to gain root privileges. | [
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:iphone:*",
"cpe:2.3:o:apple:ipad_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
CVE-2023-29287 | Adobe Commerce Information Exposure Security feature bypass | Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Information Exposure vulnerability that could lead to a security feature bypass. An attacker could leverage this vulnerability to leak minor user data. Exploitation of this issue does not require user interaction.. | [
"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*"
] | null | 5.3 | null | null |
GHSA-cc55-ww9c-8rc9 | Cisco WebEx Meeting Center allows remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by discovering credentials, aka Bug ID CSCut17466. | [] | null | null | null | null |
|
GHSA-34v3-f2p3-76vj | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in SupportRpcServlet. | [] | null | null | null | null |
|
GHSA-679v-hh23-h5jh | Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | [] | null | 9.8 | null | null |
|
CVE-2023-52829 | wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() | In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps()
reg_cap.phy_id is extracted from WMI event and could be an unexpected value
in case some errors happen. As a result out-of-bound write may occur to
soc->hal_reg_cap. Fix it by validating reg_cap.phy_id before using it.
This is found during code review.
Compile tested only. | [] | null | 6.2 | null | null |
GHSA-m5ph-rhpp-mfxj | Cleartext Transmission of Sensitive Information, Use of Hard-coded Credentials vulnerability in Ataturk University ATA-AOF Mobile Application allows Authentication Abuse, Authentication Bypass.This issue affects ATA-AOF Mobile Application: before 20.06.2025. | [] | null | 10 | null | null |
|
CVE-2024-23157 | Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products | A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process. | [
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2024:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.