id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-26988 | init/main.c: Fix potential static_command_line memory overflow | In the Linux kernel, the following vulnerability has been resolved:
init/main.c: Fix potential static_command_line memory overflow
We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for
static_command_line, but the strings copied into static_command_line are
extra_command_line and command_line, rather than extra_command_line and
boot_command_line.
When strlen(command_line) > strlen(boot_command_line), static_command_line
will overflow.
This patch just recovers strlen(command_line) which was miss-consolidated
with strlen(boot_command_line) in the commit f5c7310ac73e ("init/main: add
checks for the return value of memblock_alloc*()") | [] | null | null | null | null |
GHSA-jqv7-vfjc-8xpm | A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for OS command injection. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier. | [] | null | 9.8 | null | null |
|
GHSA-r32w-vrgx-96x6 | A security defect was identified in Foundry workspace-server that enabled a user to bypass an authorization check and view settings related to 'Developer Mode'. This enabled users with insufficient privilege the ability to view and interact with Developer Mode settings in a limited capacity. A fix was deployed with workspace-server 7.7.0. | [] | null | 4.3 | null | null |
|
RHSA-2013:0757 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified JavaFX buffer overflow leading to JVM compromise (CanSecWest 2013, JavaFX) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) JDK: unspecified vulnerability fixed in 7u21 (Deployment) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) JDK: unspecified vulnerability fixed in 7u21 (Install) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2024-13278 | Diff - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-042 | Incorrect Authorization vulnerability in Drupal Diff allows Functionality Misuse.This issue affects Diff: from 0.0.0 before 1.8.0. | [] | null | 9.1 | null | null |
CVE-2024-46700 | drm/amdgpu/mes: fix mes ring buffer overflow | In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/mes: fix mes ring buffer overflow
wait memory room until enough before writing mes packets
to avoid ring buffer overflow.
v2: squash in sched_hw_submission fix
(cherry picked from commit 34e087e8920e635c62e2ed6a758b0cd27f836d13) | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2008-3446 | Directory traversal vulnerability in inc/wysiwyg.php in LetterIt 2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter. | [
"cpe:2.3:a:letterit:letterit:2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2020-22167 | PHPGurukul Hospital Management System in PHP v4.0 has a Persistent Cross-Site Scripting vulnerability in \hms\admin\appointment-history.php. Remote registered users can exploit the vulnerability to obtain user cookie data. | [
"cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-57960 | Input verification vulnerability in the ExternalStorageProvider module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [] | null | 7.7 | null | null |
|
GHSA-vhvr-hgg7-6xqj | RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure. | [] | null | 9.1 | null | null |
|
CVE-2008-0167 | The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances. | [
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*",
"cpe:2.3:a:gforge:gforge:4.5.14:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2024-23150 | Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products | A maliciously crafted PRT file, when parsed in odxug_dll.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2024:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2007-1680 | Stack-based buffer overflow in the createAndJoinConference function in the AudioConf ActiveX control (yacscom.dll) in Yahoo! Messenger before 20070313 allows remote attackers to execute arbitrary code via long (1) socksHostname and (2) hostname properties. | [
"cpe:2.3:a:yahoo:messenger:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:yahoo:messenger:8.0.0.863:*:*:*:*:*:*:*",
"cpe:2.3:a:yahoo:messenger:8.0_2005.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:yahoo:messenger:8.1.0.209:*:*:*:*:*:*:*",
"cpe:2.3:a:yahoo:messenger:8.1.0.239:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-27292 | An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters. | [
"cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-gp6x-x64p-2cpc | Improper input validation in firmware for some Intel(R) FPGA products before version 2.9.1 may allow denial of service. | [] | null | 4.4 | null | null |
|
CVE-2008-0103 | Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a "memory handling error," aka "Microsoft Office Execution Jump Vulnerability." | [
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac\\+os:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-hgxh-r733-qxg7 | Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. | [] | null | 7.5 | null | null |
|
CVE-2009-3153 | Multiple cross-site scripting (XSS) vulnerabilities in x10 MP3 Search engine 1.6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) pic_id parameter to includes/video_ad.php, (2) category parameter to linkvideos_listing.php, id parameter to (3) templates/header1.php and (4) mp3/lyrics.php, key parameter to (5) video_listing.php and (6) adult/video_listing.php, and name parameter to (7) mp3/embed.php and (8) mp3/info.php. | [
"cpe:2.3:a:x10media:mp3_search_engine:1.6.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-56347 | IBM AIX command execution | IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls. | [
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
CVE-2020-12680 | Avira Free Antivirus through 15.0.2005.1866 allows local users to discover user credentials. The functions of the executable file Avira.PWM.NativeMessaging.exe are aimed at collecting credentials stored in Chrome, Firefox, Opera, and Edge. The executable does not verify the calling program and thus a request such as fetchChromePasswords or fetchCredentials will succeed. NOTE: some third parties have stated that this is "not a vulnerability. | [
"cpe:2.3:a:avira:free_antivirus:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-p433-2qq4-4pvv | A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website header parameter. | [] | null | 5.4 | null | null |
|
CVE-2011-0855 | Unspecified vulnerability in the InForm component in Oracle Industry Applications 4.5, 4.6, and 5.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Core. | [
"cpe:2.3:a:oracle:industry_applications:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
CVE-2016-1265 | Junos Space: privilege escalation vulnerabilities in Junos Space | A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. All versions of Juniper Networks Junos Space prior to 15.1R3 are affected. | [
"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
RHSA-2006:0618 | Red Hat Security Advisory: apache security update | httpd: Expect header XSS | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
CVE-2021-32825 | ZipSlip vulnerability in bblfshd | bblfshd is an open source self-hosted server for source code parsing. In bblfshd before commit 4265465b9b6fb5663c30ee43806126012066aad4 there is a "zipslip" vulnerability. The unsafe handling of symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations outside the designated target folder. This issue may lead to arbitrary file write (with same permissions as the program running the unpack operation) if the attacker can control the archive file. Additionally, if the attacker has read access to the unpacked files, he may be able to read arbitrary system files the parent process has permissions to read. For more details including a PoC see the referenced GHSL-2020-258. | [
"cpe:2.3:a:bblfshd_project:bblfshd:*:*:*:*:*:*:*:*"
] | null | 2.7 | null | null |
CVE-2017-3383 | Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
CVE-2023-1046 | MuYuCMS getFile.html server-side request forgery | A vulnerability classified as critical has been found in MuYuCMS 2.2. This affects an unknown part of the file /admin.php/update/getFile.html. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221805 was assigned to this vulnerability. | [
"cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-hrg4-r4x5-qp6w | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). | [] | null | null | null | null |
|
GHSA-49rc-r9gq-p7qq | Windows Mobile Broadband Driver Denial of Service Vulnerability | [] | null | 6.5 | null | null |
|
CVE-2024-1853 | Zemana AntiLogger v2.74.204.664 - Arbitrary Process Termination | Zemana AntiLogger v2.74.204.664 is vulnerable to an Arbitrary Process Termination vulnerability by triggering the 0x80002048 IOCTL code of the zam64.sys and zamguard64.sys drivers.
| [] | null | 5.5 | null | null |
CVE-2021-28249 | CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:ca:ehealth_performance_manager:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 7.2 |
|
GHSA-7373-2gf3-53wq | SWFTools commit 772e55a2 was discovered to contain a segmentation violation via convert_gfxline at /gfxpoly/convert.c. | [] | null | 5.5 | null | null |
|
CVE-2021-40741 | Adobe Audition Memory Corruption could lead to Application denial-of-service | Adobe Audition version 14.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | null |
CVE-2016-8364 | An issue was discovered in IBHsoftec S7-SoftPLC prior to 4.12b. Object memory can read a network packet that is larger than the space that is available, a Heap-based Buffer Overflow. | [
"cpe:2.3:a:ibhsoftec:s7-softplc:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2021-0243 | Junos OS: EX4300: Stateless firewall policer fails to discard traffic | Improper Handling of Unexpected Data in the firewall policer of Juniper Networks Junos OS on EX4300 switches allows matching traffic to exceed set policer limits, possibly leading to a limited Denial of Service (DoS) condition. When the firewall policer discard action fails on a Layer 2 port, it will allow traffic to pass even though it exceeds set policer limits. Traffic will not get discarded, and will be forwarded even though a policer discard action is configured. When the issue occurs, traffic is not discarded as desired, which can be observed by comparing the Input bytes with the Output bytes using the following command: user@junos> monitor interface traffic Interface Link Input bytes (bps) Output bytes (bps) ge-0/0/0 Up 37425422 (82616) 37425354 (82616) <<<< egress ge-0/0/1 Up 37425898 (82616) 37425354 (82616) <<<< ingress The expected output, with input and output counters differing, is shown below: Interface Link Input bytes (bps) Output bytes (bps) ge-0/0/0 Up 342420570 (54600) 342422760 (54600) <<<< egress ge-0/0/1 Up 517672120 (84000) 342420570 (54600) <<<< ingress This issue only affects IPv4 policing. IPv6 traffic and firewall policing actions are not affected by this issue. This issue affects Juniper Networks Junos OS on the EX4300: All versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2. | [
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
CVE-2018-12779 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-hjj2-x4c3-xqp4 | OpenIAM before 4.2.0.3 has Incorrect Access Control for the Create User, Modify User Permissions, and Password Reset actions. | [] | null | 9.8 | null | null |
|
GHSA-vqwf-pqwm-mrf6 | The Check & Log Email WordPress plugin before 1.0.6 does not sanitise and escape a parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting | [] | null | 6.1 | null | null |
|
PYSEC-2023-120 | null | ### Impact
aiohttp v3.8.4 and earlier are [bundled with llhttp v6.0.6](https://github.com/aio-libs/aiohttp/blob/v3.8.4/.gitmodules) which is vulnerable to CVE-2023-30589. The vulnerable code is used by aiohttp for its HTTP request parser when available which is the default case when installing from a wheel.
This vulnerability only affects users of aiohttp as an HTTP server (ie `aiohttp.Application`), you are not affected by this vulnerability if you are using aiohttp as an HTTP client library (ie `aiohttp.ClientSession`).
### Reproducer
```python
from aiohttp import web
async def example(request: web.Request):
headers = dict(request.headers)
body = await request.content.read()
return web.Response(text=f"headers: {headers} body: {body}")
app = web.Application()
app.add_routes([web.post('/', example)])
web.run_app(app)
```
Sending a crafted HTTP request will cause the server to misinterpret one of the HTTP header values leading to HTTP request smuggling.
```console
$ printf "POST / HTTP/1.1\r\nHost: localhost:8080\r\nX-Abc: \rxTransfer-Encoding: chunked\r\n\r\n1\r\nA\r\n0\r\n\r\n" \
| nc localhost 8080
Expected output:
headers: {'Host': 'localhost:8080', 'X-Abc': '\rxTransfer-Encoding: chunked'} body: b''
Actual output (note that 'Transfer-Encoding: chunked' is an HTTP header now and body is treated differently)
headers: {'Host': 'localhost:8080', 'X-Abc': '', 'Transfer-Encoding': 'chunked'} body: b'A'
```
### Patches
Upgrade to the latest version of aiohttp to resolve this vulnerability. It has been fixed in v3.8.5: [`pip install aiohttp >= 3.8.5`](https://pypi.org/project/aiohttp/3.8.5/)
### Workarounds
If you aren't able to upgrade you can reinstall aiohttp using `AIOHTTP_NO_EXTENSIONS=1` as an environment variable to disable the llhttp HTTP request parser implementation. The pure Python implementation isn't vulnerable to request smuggling:
```console
$ python -m pip uninstall --yes aiohttp
$ AIOHTTP_NO_EXTENSIONS=1 python -m pip install --no-binary=aiohttp --no-cache aiohttp
```
### References
* https://nvd.nist.gov/vuln/detail/CVE-2023-30589
* https://hackerone.com/reports/2001873
| [] | null | null | null | null |
CVE-2021-38529 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.56, R7800 before 1.0.2.68, R8900 before 1.0.4.26, and R9000 before 1.0.4.26. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*"
] | null | 8.3 | null | null |
|
GHSA-gjf9-pfmc-2689 | A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, can force a Stack-based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null |
|
CVE-2010-1757 | WebKit in Apple iOS before 4 on the iPhone and iPod touch does not enforce the expected boundary restrictions on content display by an IFRAME element, which allows remote attackers to spoof the user interface via a crafted HTML document. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipod_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2023-28415 | WordPress Side Cart Woocommerce (Ajax) Plugin <= 2.2 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in XootiX Side Cart Woocommerce (Ajax) plugin <= 2.2 versions. | [
"cpe:2.3:a:xootix:side_cart_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-hwh7-ch44-hwg9 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14034. | [] | null | null | null | null |
|
GHSA-p84w-jjxr-7hjx | web-tools in SAP DB before 7.4.03.30 installs several services that are enabled by default, which could allow remote attackers to obtain potentially sensitive information or redirect attacks against internal databases via (1) waecho, (2) Web SQL Interface (websql), or (3) Web Database Manager (webdbm). | [] | null | null | null | null |
|
GHSA-86w5-3hcx-wfr7 | In JetBrains TeamCity before 2020.2.4 on Windows, arbitrary code execution on TeamCity Server was possible. | [] | null | null | null | null |
|
CVE-2019-15961 | Clam AntiVirus (ClamAV) Software Email Parsing Vulnerability | A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.102.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:11.1.1-042:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:11.1.2-023:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
ICSA-23-131-02 | Siemens SCALANCE W1750D | The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. | [] | null | 8.4 | null | null |
CVE-2025-20179 | Cisco Expressway Series Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. | [] | null | 6.1 | null | null |
CVE-2021-36546 | Incorrect Access Control issue discovered in KiteCMS 1.1 allows remote attackers to view sensitive information via path in application URL. | [
"cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-rf4j-8v9c-f879 | Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. | [] | null | null | null | null |
|
GHSA-6p2h-8jgw-4php | Unknown vulnerability in Veritas i3 Focalpoint Server 7.1 and earlier has unknown attack vectors and unknown but "critical" impact. | [] | null | null | null | null |
|
GHSA-qgc4-q259-hqvf | Memory leak in Netscape Collabra Server 3.5.4 and earlier allows a remote attacker to cause a denial of service (memory exhaustion) by repeatedly sending approximately 5K of data to TCP port 5238. | [] | null | null | null | null |
|
CVE-2020-10754 | It was found that nmcli, a command line interface to NetworkManager did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings, when creating a new profile. When a user connects to a network using this profile, the authentication does not happen and the connection is made insecurely. | [
"cpe:2.3:a:gnome:networkmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-33cc-g8rq-488v | Terong PHP Photo Gallery (aka Advanced Web Photo Gallery) 1.0 stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information. | [] | null | null | null | null |
|
CVE-2016-8357 | An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. A user with read-only access can send commands to the software and the application will accept those commands. This would allow an attacker with read-only access to make changes within the application. | [
"cpe:2.3:a:lynxspring:jenesys_bas_bridge:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.5 |
|
CVE-2006-3777 | PHP remote file inclusion vulnerability in index.php in IDevSpot PhpLinkExchange 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter. | [
"cpe:2.3:a:idevspot:phplinkexchange:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3fq4-7v27-7g49 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18630. | [] | null | 7.8 | null | null |
|
CVE-2008-4781 | Directory traversal vulnerability in update.php in MyKtools 2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the langage parameter. | [
"cpe:2.3:a:easy-script:myktools:2.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-c6g7-c2cg-grhj | A vulnerability was found in Moodle affecting 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where users with the capability to create courses were assigned as a teacher in those courses, regardless of whether they had the capability to be automatically assigned that role. | [] | null | null | null | null |
|
GHSA-m2r6-rffh-gjv3 | A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x2200B4 in the TMWFP driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] | null | null | 6.3 | null |
|
CVE-2017-11927 | Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow an information vulnerability due to the way the Windows its:// protocol handler determines the zone of a request, aka "Microsoft Windows Information Disclosure Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2021-23758 | Deserialization of Untrusted Data | All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. | [
"cpe:2.3:a:ajaxpro.2_project:ajaxpro.2:*:*:*:*:*:.net:*:*"
] | null | 8.1 | null | null |
GHSA-6mq6-fpvp-rmfg | An access issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.1. An app may be able to modify protected parts of the file system. | [] | null | 5.5 | null | null |
|
GHSA-v7g6-6mrr-692g | Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors. | [] | null | null | null | null |
|
CVE-2019-2897 | Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. While the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | 5.5 |
|
CVE-2019-12636 | Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability | A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device. | [
"cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
CVE-2021-23362 | Regular Expression Denial of Service (ReDoS) | The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity. | [
"cpe:2.3:a:npmjs:hosted-git-info:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2015-9318 | The awesome-support plugin before 3.1.7 for WordPress has a security issue in which shortcodes are allowed in replies. | [
"cpe:2.3:a:getawesomesupport:awesome_support:*:*:*:*:*:wordpress:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2006-0625 | Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3. | [
"cpe:2.3:a:spip:spip:1.8.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:1.8.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:spip:spip:1.8.2g:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2024-10474 | Focus was incorrectly allowing internal links to utilize the app scheme used for deeplinking, which could result in links potentially circumventing some URL safety checks This vulnerability affects Focus for iOS < 132. | [
"cpe:2.3:a:mozilla:focus_for_ios:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:iphone_os:*:*"
] | null | 9.1 | null | null |
|
GHSA-jpxp-w99g-6pgv | A vulnerability in Cisco Webex Meetings for Android could allow an unauthenticated, local attacker to perform a cross-site scripting attack against the application. The vulnerability is due to insufficient validation of the application input parameters. An attacker could exploit this vulnerability by sending a malicious request to the Webex Meetings application through an intent. A successful exploit could allow the attacker to execute script code in the context of the Webex Meetings application. Versions prior to 11.7.0.236 are affected. | [] | null | null | 4.6 | null |
|
GHSA-jc8m-cxhj-668x | Improper Restriction of Excessive Authentication Attempts in Sorcery | ImpactBrute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.PatchesPatched as of version `0.15.0`.WorkaroundsCurrently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`. | [] | null | 8.3 | null | null |
GHSA-3x3f-jcp3-g22j | @backstage/plugin-catalog-backend Prototype Pollution vulnerability | ImpactA malicious actor with authenticated access to a Backstage instance with the catalog backend plugin installed is able to interrupt the service using a specially crafted query to the catalog API.PatchesThis has been fixed in the `1.26.0` release of the `@backstage/plugin-catalog-backend` package.ReferencesIf you have any questions or comments about this advisory:Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
Visit our Discord, linked to in [Backstage README](https://github.com/backstage/backstage) | [] | 7.1 | 6.5 | null | null |
GHSA-gpjg-fjjx-7625 | Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability. | [] | null | null | 8.8 | null |
|
CVE-2010-2553 | The Cinepak codec in Microsoft Windows XP SP2 and SP3, Windows Vista SP1 and SP2, and Windows 7 does not properly decompress media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Cinepak Codec Decompression Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2020-6213 | SAP NetWeaver AS ABAP Business Server Pages Test Application SBSPEXT_PHTMLB, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, is vulnerable to reflected Cross-Site Scripting (XSS) via different URL parameters as it does not sufficiently encode user controlled inputs. | [
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:740:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:751:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:754:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-wr8r-jchq-frxg | SQL injection vulnerability in showcat.php in phpLinkat 0.1 allows remote attackers to execute arbitrary SQL commands via the catid parameter. | [] | null | null | null | null |
|
CVE-2023-52661 | drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() | In the Linux kernel, the following vulnerability has been resolved:
drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
If clk_get_sys(..., "pll_d2_out0") fails, the clk_get_sys() call must be
undone.
Add the missing clk_put and a new 'put_pll_d_out0' label in the error
handling path, and use it. | [] | null | null | null | null |
CVE-2023-24046 | An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to run arbitrary commands via use of a crafted string in the ping utility. | [
"cpe:2.3:o:connectize:ac21000_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:connectize:ac21000_g6_firmware:641.139.1.1256:*:*:*:*:*:*:*",
"cpe:2.3:h:connectize:ac21000_g6:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2019-10569 | Stack buffer overflow due to instance id is misplaced inside definition of hardware accelerated effects in makefile in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, APQ8098, MDM9607, MDM9640, MSM8998, QCS605, SC8180X, SDM439, SDM630, SDM636, SDM660, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 | [
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-7fqj-cg79-f2pv | Thumbshooter vulnerable to Code Injection | lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | null | null | null | null |
CVE-2013-5568 | The auto-update implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier allows remote attackers to cause a denial of service (device reload) via crafted update data, aka Bug ID CSCui33308. | [
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.28\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.31\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.34\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.37\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.17\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\(1.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\(1.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\(3\\):*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-qjfc-9x3x-5h2r | Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [] | null | null | null | null |
|
GHSA-9mw4-rw8p-v786 | Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-825f-w844-wh2j | Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21083. | [] | null | null | 3.3 | null |
|
CVE-2005-2174 | Bugzilla 2.17.x, 2.18 before 2.18.2, 2.19.x, and 2.20 before 2.20rc1 inserts a bug into the database before it is marked private, which introduces a race condition and allows attackers to access information about the bug via buglist.cgi before MySQL replication is complete. | [
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-rw9p-4whq-876w | syscp 1.4.2.1 allows attackers to add arbitrary paths via the documentroot of a domain by appending a colon to it and setting the open basedir path to use that domain documentroot. | [] | null | null | null | null |
|
CVE-2015-3409 | Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module. | [
"cpe:2.3:a:module-signature_project:module-signature:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2009-4158 | SQL injection vulnerability in the Calendar Base (cal) extension before 1.2.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:0.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mario_matzulla:cal:1.1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-qw2x-4966-p858 | Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action. | [] | null | null | null | null |
|
GHSA-mvj7-26c8-jmvg | SIMDComp before 0.1.1 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) because it can read (and then discard) extra bytes. NOTE: this issue exists because of an incomplete fix for CVE-2018-17427. | [] | null | null | 6.5 | null |
|
GHSA-qxr4-8jqx-8c2w | A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the labels colour feature which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. | [] | null | 5.4 | null | null |
|
ICSA-23-012-06 | Johnson Controls Metasys | Under certain circumstances, the affected versions of Johnson Controls Metasys ADS/ADX/OAS Servers could expose plaintext credentials through application programmable interface (API) calls.-CVE-2021-36204 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
PYSEC-2017-125 | null | There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek function of Exiv2 0.26 that will lead to a remote denial of service attack (heap memory corruption) via crafted input. | [] | null | null | 7.5 | null |
GHSA-qfrc-4c6q-334p | An issue was discovered in GitLab CE/EE affecting all versions starting from 17.1 prior to 17.6.0, which allows an attacker with maintainer role to trigger a pipeline as project owner under certain circumstances. | [] | null | 4.4 | null | null |
|
GHSA-f6j4-cwrp-j9m3 | A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to reboot the router by submitting a reboot.html GET request without being authenticated on the admin interface. | [] | null | 7.5 | null | null |
|
CVE-2021-29520 | Heap buffer overflow in `Conv3DBackprop*` | TensorFlow is an end-to-end open source platform for machine learning. Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 2.5 | null | null |
GHSA-9j36-jg73-vfcw | The d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0 | [] | null | 9.8 | null | null |
|
GHSA-v69h-29mg-rp95 | xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | [] | null | null | 9.8 | null |
Subsets and Splits