id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-232m-53gr-9v22
The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
[]
null
null
null
null
GHSA-xcvv-3xh8-q2mj
Stored Cross Site Scripting(XSS) vulnerability in Egavilan Media Resumes Management and Job Application Website 1.0 allows remote attackers to inject arbitrary code via First and Last Name in Apply For This Job Form.
[]
null
6.1
null
null
CVE-2004-1491
Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-5g4q-5r23-wrrp
Missing Authorization vulnerability in Webcodin WCP Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCP Contact Form: from n/a through 3.1.0.
[]
null
7.5
null
null
GHSA-xh7c-xrrg-3jv2
An Insecure Direct Object Reference (IDOR) vulnerability was found in Prestashop Opart devis < 4.0.2. Unauthenticated attackers can have access to any user's invoice and delivery address by exploiting an IDOR on the delivery_address and invoice_address fields.
[]
null
null
null
null
CVE-2016-1496
The graphics driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230 allows attackers to cause a denial of service (system crash) via a crafted application, aka a "semaphore deadlock issue."
[ "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-cl00c92b220:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-cl10c92b220:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-tl00c01b220:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-ul00c00b220:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-ul10c00b220:*:*:*:*:*:*:*" ]
null
null
5.5
7.1
CVE-2018-3293
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
null
8.6
4.4
CVE-2018-0861
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, and CVE-2018-0866.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
7.5
9.3
GHSA-p97c-fp25-v4hq
IBM Maximo Asset Management 7.6.0 and 7.6.1 does not invalidate session after logout which could allow a local user to impersonate another user on the system. IBM X-Force ID: 167451.
[]
null
null
null
null
CVE-2023-32535
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32534.
[ "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*" ]
null
6.1
null
null
GHSA-h843-jc82-h6jf
A Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on ACX5448 and ACX710 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).If an interface flaps while the system gathers statistics on that interface, two processes simultaneously access a shared resource which leads to a PFE crash and restart.This issue affects Junos OS:All versions before 20.4R3-S9,21.2 versions before 21.2R3-S5,21.3 versions before 21.3R3-S5,21.4 versions before 21.4R3-S4,22.1 versions before 22.1R3-S2,22.2 versions before 22.2R3-S2,22.3 versions before 22.3R2-S2, 22.3R3,22.4 versions before 22.4R2.
[]
7.1
6.5
null
null
CVE-2023-38691
matrix-appservice-bridge doesn't verify the sub parameter of an openId token exhange, allowing unauthorized access to provisioning APIs
matrix-appservice-bridge provides an API for setting up bridges. Starting in version 4.0.0 and prior to versions 8.1.2 and 9.0.1, a malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API. The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests. Versions 8.1.2 and 9.0.1 contain a patch. As a workaround, disable the provisioning API.
[ "cpe:2.3:a:matrix:matrix-appservice-bridge:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:matrix:matrix-appservice-bridge:9.0.0:*:*:*:*:node.js:*:*" ]
null
5
null
null
GHSA-cfxp-7mcx-7phh
YaBB SE 1.5.1 allows remote attackers to obtain sensitive information via a direct HTTP request to Admin.php, which reveals the full path in a PHP error message.
[]
null
null
null
null
CVE-2021-27273
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SettingConfigController class. When parsing the fileName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12121.
[ "cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.26:*:*:*:*:*:*:*" ]
null
null
8.8
null
RHSA-2014:0497
Red Hat Security Advisory: Red Hat JBoss Fuse 6.1.0 security update
1: Class Loader manipulation via request parameters
[ "cpe:/a:redhat:jboss_fuse:6.1.0" ]
null
null
null
null
GHSA-9j99-q238-v99m
Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/admin/?page=products/manage_product&id=.
[]
null
7.2
null
null
GHSA-v9p6-xj6q-xr4h
Huawei smartphones Taurus-AL00B with versions earlier than 10.0.0.205(C00E201R7P2) have an improper authentication vulnerability. The software insufficiently validate the user's identity when a user wants to do certain operation. An attacker can trick user into installing a malicious application to exploit this vulnerability. Successful exploit may cause some information disclosure.
[]
null
null
null
null
RHSA-2020:5118
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
GHSA-2h6c-m9mj-xfcf
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
[]
null
null
null
null
GHSA-79rx-qr2j-vm25
Cross-site scripting (XSS) vulnerability in the volume backup service module in Huawei Public Cloud Solution before 1.0.5 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
5.4
null
RHSA-2021:3155
Red Hat Security Advisory: thunderbird security update
Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
7.5
null
CVE-2010-2370
Unspecified vulnerability in the Oracle Business Process Management component in Oracle Fusion Middleware 5.7 MP3, 6.0 MP5, and 10.3 MP2 allows remote attackers to affect integrity, related to BPM.
[ "cpe:2.3:a:oracle:fusion_middleware:5.7:mp3:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.0:mp5:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3:mp2:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-9xgq-hv63-rmpj
An issue was discovered in Hyland OnBase through 18.0.0.32 and 19.x through 19.8.9.1000. PKI certificates have a private key that is the same across different customers' installations.
[]
null
9.1
null
null
GHSA-q72h-h33r-r8j8
Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.
[]
null
7.8
null
null
GHSA-958v-fr7p-8j69
A numeric overflow in Skia in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
[]
null
8.8
null
null
CVE-2013-4104
Cryptocat before 2.0.22 has weak encryption in the Socialist Millionnaire Protocol
[ "cpe:2.3:a:cryptocat_project:cryptocat:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-hh33-x9h6-xp68
File Upload vulnerability in SEMCMS 3.9 allows remote attackers to run arbitrary code via SEMCMS_Upfile.php.
[]
null
7.2
null
null
CVE-2024-30589
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability in the entrys parameter of the fromAddressNat function.
[ "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-9pgx-pf36-w46r
CakePHP allows method override parameters to bypass CSRF checks
A vulnerability exists in CakePHP versions 4.0.x through 4.1.3. The CsrfProtectionMiddleware component allows method override parameters to bypass CSRF checks by changing the HTTP request method to an arbitrary string that is not in the list of request methods that CakePHP checks. Additionally, the route middleware does not verify that this overriden method (which can be an arbitrary string) is actually an HTTP method.
[]
null
8.8
null
null
GHSA-gc7m-x2cj-3775
Missing permission check in Jenkins JiraTestResultReporter Plugin
A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
[]
null
4.3
null
null
GHSA-hq8j-584q-8j9q
In the Linux kernel, the following vulnerability has been resolved:ppp: fix ppp_async_encode() illegal accesssyzbot reported an issue in ppp_async_encode() [1]In this case, pppoe_sendmsg() is called with a zero size. Then ppp_async_encode() is called with an empty skb.BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline] BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675 ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline] ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675 ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634 ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline] ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304 pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379 sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113 __release_sock+0x1da/0x330 net/core/sock.c:3072 release_sock+0x6b/0x250 net/core/sock.c:3626 pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:744 ____sys_sendmsg+0x903/0xb60 net/socket.c:2602 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656 __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742 __do_sys_sendmmsg net/socket.c:2771 [inline] __se_sys_sendmmsg net/socket.c:2768 [inline] __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768 x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7fUninit was created at: slab_post_alloc_hook mm/slub.c:4092 [inline] slab_alloc_node mm/slub.c:4135 [inline] kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587 __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678 alloc_skb include/linux/skbuff.h:1322 [inline] sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732 pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:744 ____sys_sendmsg+0x903/0xb60 net/socket.c:2602 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656 __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742 __do_sys_sendmmsg net/socket.c:2771 [inline] __se_sys_sendmmsg net/socket.c:2768 [inline] __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768 x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7fCPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[]
null
7.1
null
null
GHSA-5353-8fg9-4vq8
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
[]
null
null
null
null
CVE-2023-43572
A buffer over-read was reported in the BiosExtensionLoader module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to disclose sensitive information.
[ "cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:o5nkt33a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920z_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920z_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_pro_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_pro_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75t_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75t_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75s_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70a_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:loq_17irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:loq_17irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5_26iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5_26iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34iaz7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34iaz7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7_34irz8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7_34irz8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5_26irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5_26irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5_01iaq7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5_01iaq7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_5_27iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_5_27iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_5_24iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_5_24iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24alc6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_27iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_27iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_24iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_24iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_22iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_22iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_21itl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_21itl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-22imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-24imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50s-07imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13iob_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13iob:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_aio_7_27arh7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_aio_7_27arh7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_aio_7-27arh6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_aio_7-27arh6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkedge_se30_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p920_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p720_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_ultra_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_ultra_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p358_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p358_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p348_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p348_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_2nd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_workstation:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
GHSA-4mw2-mw6m-p7x4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExpertBusinessSearch Local Search SEO Contact Page allows Stored XSS. This issue affects Local Search SEO Contact Page: from n/a through 4.0.1.
[]
null
6.5
null
null
GHSA-f7fh-pf49-jf37
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
[]
null
null
null
null
GHSA-6p6h-7mm4-6mhv
Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.
[]
null
null
null
null
CVE-2024-1119
The Order Tip for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_tips_to_csv() function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to export the plugin's order fees.
[ "cpe:2.3:a:adrian_emil_tudorache:order_tip:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-g677-c5v4-98qx
Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
[]
null
null
null
null
GHSA-p2hw-rvhj-wg9r
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setUrlFilterRules function.
[]
null
7.3
null
null
GHSA-vxrv-w89g-fgqx
SQL injection vulnerability in ViewBugs.php in Tyger Bug Tracking System (TygerBT) 1.1.3 allows remote attackers to execute arbitrary SQL commands via the s parameter.
[]
null
null
null
null
CVE-2017-2745
Potential security vulnerabilities have been identified with HP JetAdvantage Security Manager before 3.0.1. The vulnerabilities could potentially be exploited to allow stored cross-site scripting which could allow a hacker to execute scripts in a user's browser.
[ "cpe:2.3:a:hp:jetadvantage_security_manager:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2021-38389
Advantech WebAccess
Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.
[ "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-7www-x428-rw8w
Kaifa Technology WebITR is an online attendance system. A remote attacker with regular user privilege can obtain partial sensitive system information from error message.
[]
null
4.3
null
null
CVE-2015-1146
The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, which allows local users to bypass intended access restrictions via a crafted bundle, a different vulnerability than CVE-2015-1145.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
1.9
CVE-2013-2599
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption passwords via a logcat call.
[ "cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.55:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.56:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.57:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.58:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.59:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.60:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.61:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.2.62:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.80:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.81:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.82:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.83:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.84:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.85:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.86:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.87:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.88:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.89:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.90:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.91:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.92:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.93:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.94:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.95:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.96:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.97:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.98:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.99:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.100:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.101:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.102:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.4.103:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.30:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.31:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.32:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.33:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.35:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.36:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.37:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.38:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.39:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.40:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.41:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.42:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.43:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.44:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.45:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.46:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.47:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.48:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.49:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.50:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.51:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.52:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.10.53:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.11:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.12:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.13:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.14:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.15:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.16:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.17:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.18:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.19:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.20:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.21:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.22:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.23:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.24:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.25:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.12.26:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.5:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.6:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.7:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.8:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.9:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.10:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.13.11:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc5:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc6:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc7:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14:rc8:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.6:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.7:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.8:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.9:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.10:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.11:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.12:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.13:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.14:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.15:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.14.16:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc4:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc5:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc6:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc7:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15:rc8:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.5:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.6:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.7:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.8:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.9:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.15.10:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc1:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc2:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc3:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc4:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc5:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc6:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16:rc7:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:codeaurora:android-msm:3.17:rc1:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-8657
Garden Gnome Package <= 2.2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Garden Gnome Package plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ggpkg shortcode in all versions up to, and including, 2.2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:ggnome:garden_gnome_package:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
CVE-2000-0416
NTMail 5.x allows network users to bypass the NTMail proxy restrictions by redirecting their requests to NTMail's web configuration server.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-fcwr-mx87-mcf2
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
[]
null
8.1
null
null
CVE-2019-13454
ImageMagick 7.0.1-0 to 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.8-54:q16:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-5469-vf4f-5v5j
Unspecified vulnerability in the Audit Vault component in Oracle Audit Vault 10.2.3.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this issue is related to a crafted parameter in an action.execute request to the av component on TCP port 5700.
[]
null
null
null
null
GHSA-4w6p-pfw8-88pv
An issue was discovered on D-Link DIR-818LW devices with firmware 2.06betab01. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Type field to SetWanSettings.
[]
null
null
null
null
RHSA-2024:0642
Red Hat Security Advisory: OpenShift Container Platform 4.14.11 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
8.1
null
null
GHSA-wpv9-pvp6-9mjq
The web server in Novell ZENworks Configuration Management (ZCM) 10.3 and 11.2 before 11.2.4 does not properly perform authentication for zenworks/jsp/index.jsp, which allows remote attackers to conduct directory traversal attacks, and consequently upload and execute arbitrary programs, via a request to TCP port 443.
[]
null
null
null
null
CVE-2016-0326
IBM Rational Quality Manager (RQM) and Rational Collaborative Lifecycle Management 3.0.1.6 before iFix8, 4.x before 4.0.7 iFix11, 5.x before 5.0.2 iFix17, and 6.x before 6.0.1 ifix3 allow remote authenticated users to execute arbitrary OS commands via a crafted "HTML request."
[ "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-q4rw-2c6x-6r6x
Winn ASP Guestbook 1.01 Beta stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for data/guestbook.mdb.
[]
null
null
null
null
CVE-2020-8714
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-q7v5-6947-34gx
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0798, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843.
[]
null
null
null
null
GHSA-r8qw-7677-x9rf
The flo-launch WordPress plugin before 2.4.1 injects code into wp-config.php when creating a cloned site, allowing any attacker to initiate a new site install by setting the flo_custom_table_prefix cookie to an arbitrary value.
[]
null
9.8
null
null
CVE-2023-34226
In JetBrains TeamCity before 2023.05 reflected XSS in the Subscriptions page was possible
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
GHSA-f5wq-j5xc-xjc7
Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'right' parameter of the update.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
CVE-2021-30661
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-c3p2-8x6x-wvh2
A Race Condition (TOCTOU) vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
[]
null
null
8.8
null
GHSA-r748-599j-vx8c
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5 and 11.1, under specific or unusual conditions, could allow a local user to overflow a buffer which may result in a privilege escalation to the DB2 instance owner. IBM X-Force ID: 141624.
[]
null
null
7
null
CVE-2017-14048
BlackCat CMS 1.2 allows remote authenticated users to inject arbitrary PHP code into info.php via a crafted new_modulename parameter to backend/addons/ajax_create.php. NOTE: this can be exploited via CSRF.
[ "cpe:2.3:a:blackcat-cms:blackcat_cms:1.2:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-9hgg-vxph-4hw9
In the Linux kernel, the following vulnerability has been resolved:tipc: fix use-after-free Read in tipc_named_reinitsyzbot found the following issue on:BUG: KASAN: use-after-free in tipc_named_reinit+0x94f/0x9b0 net/tipc/name_distr.c:413 Read of size 8 at addr ffff88805299a000 by task kworker/1:9/23764CPU: 1 PID: 23764 Comm: kworker/1:9 Not tainted 5.18.0-rc4-syzkaller-00878-g17d49e6e8012 #0 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events tipc_net_finalize_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0xeb/0x495 mm/kasan/report.c:313 print_report mm/kasan/report.c:429 [inline] kasan_report.cold+0xf4/0x1c6 mm/kasan/report.c:491 tipc_named_reinit+0x94f/0x9b0 net/tipc/name_distr.c:413 tipc_net_finalize+0x234/0x3d0 net/tipc/net.c:138 process_one_work+0x996/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 </TASK> [...]In the commit d966ddcc3821 ("tipc: fix a deadlock when flushing scheduled work"), the cancel_work_sync() function just to make sure ONLY the work tipc_net_finalize_work() is executing/pending on any CPU completed before tipc namespace is destroyed through tipc_exit_net(). But this function is not guaranteed the work is the last queued. So, the destroyed instance may be accessed in the work which will try to enqueue later.In order to completely fix, we re-order the calling of cancel_work_sync() to make sure the work tipc_net_finalize_work() was last queued and it must be completed by calling cancel_work_sync().
[]
null
7.8
null
null
GHSA-pv24-75cx-c5m2
A spoofing vulnerability exists when Windows incorrectly validates file signatures, aka 'Windows Spoofing Vulnerability'.
[]
null
5.3
null
null
CVE-2025-27775
Applio allows SSRF and file write in model_download.py
Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) and file write in `model_download.py` (line 143 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can be leveraged to probe for other vulnerabilities on the server itself or on other back-end systems on the internal network, that the Applio server can reach. The file write allows for writing files on the server, which can be coupled with other vulnerabilities, for example an unsafe deserialization, to achieve remote code execution on the Applio server. As of time of publication, no known patches are available.
[]
8.8
null
null
null
GHSA-gx2w-592v-wg4m
A session rendering issue was addressed with improved session tracking. This issue is fixed in macOS Sonoma 14.2.1. A user who shares their screen may unintentionally share the incorrect content.
[]
null
5.7
null
null
GHSA-3cmq-72j9-674j
In the Linux kernel, the following vulnerability has been resolved:seccomp: passthrough uretprobe systemcall without filteringWhen attaching uretprobes to processes running inside docker, the attached process is segfaulted when encountering the retprobe.The reason is that now that uretprobe is a system call the default seccomp filters in docker block it as they only allow a specific set of known syscalls. This is true for other userspace applications which use seccomp to control their syscall surface.Since uretprobe is a "kernel implementation detail" system call which is not used by userspace application code directly, it is impractical and there's very little point in forcing all userspace applications to explicitly allow it in order to avoid crashing tracked processes.Pass this systemcall through seccomp without depending on configuration.Note: uretprobe is currently only x86_64 and isn't expected to ever be supported in i386.[kees: minimized changes for easier backporting, tweaked commit log]
[]
null
null
null
null
GHSA-rxxr-9pqj-xw7v
u'Buffer overflow while parsing PMF enabled MCBC frames due to frame length being lesser than what is expected while parsing' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, IPQ8074, Kamorta, Nicobar, QCA6390, QCA8081, QCN7605, QCS404, QCS405, QCS605, Rennell, SA415M, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130
[]
null
null
null
null
CVE-2024-46806
drm/amdgpu: Fix the warning division or modulo by zero
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the warning division or modulo by zero Checks the partition mode and returns an error for an invalid mode.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2010-4504
Multiple cross-site scripting (XSS) vulnerabilities in eSyndiCat Directory 2.3 allow remote attackers to inject arbitrary web script or HTML via the title parameter to (1) suggest-category.php and (2) suggest-listing.php.
[ "cpe:2.3:a:intelliants:esyndicat:2.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2008-7241
Cross-site request forgery (CSRF) vulnerability in PunBB before 1.2.17 allows remote attackers to hijack the authentication of unspecified users for requests related to a logout, probably a forced logout.
[ "cpe:2.3:a:punbb:punbb:*:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.15:*:*:*:*:*:*:*" ]
null
null
null
6.8
ICSA-19-099-03
Siemens Industrial Products with OPC UA (Update H)
Specially crafted network packets sent to affected devices on Port 4840/TCP could allow an unauthenticated remote attacker to cause a denial-of-service condition in the OPC communication or crash the device. An attacker with network access to the affected systems could exploit the vulnerability. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the OPC communication. CVE-2019-6575 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
7.5
null
null
CVE-2008-4199
Opera before 9.52 does not prevent use of links from web pages to feed source files on the local disk, which might allow remote attackers to determine the validity of local filenames via vectors involving "detection of JavaScript events and appropriate manipulation."
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*" ]
null
null
null
5
GHSA-xg78-wwf5-gc23
A vulnerability in the web-based user interface (web UI) of Cisco IOS XE 16.2 could allow an authenticated, remote attacker to elevate their privileges on an affected device. The vulnerability is due to incorrect default permission settings for new users who are created by using the web UI of the affected software. An attacker could exploit this vulnerability by using the web UI of the affected software to create a new user and then logging into the web UI as the newly created user. A successful exploit could allow the attacker to elevate their privileges on the affected device. This vulnerability affects Cisco devices that are running a vulnerable release Cisco IOS XE Software, if the HTTP Server feature is enabled for the device. The newly redesigned, web-based administration UI was introduced in the Denali 16.2 Release of Cisco IOS XE Software. This vulnerability does not affect the web-based administration UI in earlier releases of Cisco IOS XE Software. Cisco Bug IDs: CSCuy83062.
[]
null
null
8.8
null
CVE-2024-6411
ProfileGrid – User Profiles, Groups and Communities <= 5.8.9 - Authenticated (Subscriber+) Authorization Bypass to Privilege Escalation
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.8.9. This is due to a lack of validation on user-supplied data in the 'pm_upload_image' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their user capabilities to Administrator.
[ "cpe:2.3:a:metagauss:profilegrid:-:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-mh9v-7ffp-36mc
Cross-site scripting vulnerability in Novell Web Search 2.0.1 allows remote attackers to execute arbitrary script as other Web Search users via the search parameter.
[]
null
null
null
null
GHSA-x832-r2rj-4g5p
SSRF in Kitodo.Presentation
An issue was discovered in the Kitodo.Presentation (aka dlf) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any file or webpage the webserver has access to.
[]
null
7.5
null
null
CVE-2017-2730
HUAWEI HiLink APP (for IOS) versions earlier before 5.0.25.306 and HUAWEI Tech Support APP (for IOS) versions earlier before 5.0.0 have an information leak vulnerability. When an iPhone with these APPs installed access the Wi-Fi hotpot built by attacker, the attacker can collect the information of iPhone mode and firmware version.
[ "cpe:2.3:a:huawei:hilink:*:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:tech_support:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*" ]
null
null
3.5
2.9
CVE-2024-1158
The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the buddyforms_new_page function in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber access or higher, to create pages with arbitrary titles. These pages are published.
[]
null
4.3
null
null
GHSA-9j2v-99xr-mq59
NTFS in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way NTFS handles objects, aka "Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability".
[]
null
null
7
null
GHSA-93qq-m35f-rfvj
io_uring uses work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. The mapping of flags is incomplete, which leads to multiple incorrect reference counts and hence use-after-free. We recommend upgrading past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859
[]
null
null
null
null
GHSA-322m-p39j-r5m2
npm-script-demo is malware
The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given.It has been removed from the npm registry.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
null
9.8
null
GHSA-4hxv-9w95-842f
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[]
null
null
null
null
RHSA-2014:0389
Red Hat Security Advisory: jasperreports-server-pro security update
XStream: remote code execution due to insecure XML deserialization
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
GHSA-3p35-pmr9-qf5c
SQL injection vulnerability in index.php in the RSGallery (com_rsgallery) 2.0 beta 5 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an inline page action.
[]
null
null
null
null
GHSA-fcff-4m68-vv98
The LH Copy Media File plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.08. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2025-28918
WordPress Featured Image Thumbnail Grid plugin <= 6.6.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in A. Jones Featured Image Thumbnail Grid allows Stored XSS. This issue affects Featured Image Thumbnail Grid: from n/a through 6.6.1.
[]
null
6.5
null
null
RHBA-2023:7648
Red Hat Bug Fix Advisory: MTV 2.5.3 Images
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake opentelemetry: DoS vulnerability in otelhttp
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
7.5
null
null
RHSA-2014:0252
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 security update
apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.2" ]
null
null
null
null
CVE-2022-24042
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could be able to capture this token and re-use old session credentials or session IDs for authorization.
[ "cpe:2.3:o:siemens:desigo_pxc5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_pxc5:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:desigo_pxc4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_pxc4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:desigo_pxc3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_pxc3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:desigo_dxr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_dxr2:-:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
GHSA-w3x9-39hr-xx2v
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (released in China and India) software. The S Secure application does not enforce the intended password requirement for a locked application. The Samsung IDs are SVE-2020-16746, SVE-2020-16764 (August 2020).
[]
null
null
null
null
GHSA-58q5-vq5j-mrh8
Cross-site request forgery (CSRF) vulnerability in html/json.html on HP 2620 switches allows remote attackers to hijack the authentication of administrators for requests that change an administrative password via the setPassword method.
[]
null
null
null
null
GHSA-g5jx-rvpr-cwqr
Missing Authorization vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.3.1.
[]
null
4.3
null
null
RHSA-2021:4088
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
8.8
null
null
CVE-2016-8975
IBM Rhapsody DM 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 118912.
[ "cpe:2.3:a:ibm:rhapsody_design_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0.3:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2008-0075
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 through 6.0 allows remote attackers to execute arbitrary code via crafted inputs to ASP pages.
[ "cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_server:6.0:beta:*:*:*:*:*:*" ]
null
null
null
10
CVE-2018-3683
Unquoted service paths in Intel Quartus Prime in versions 15.1 - 18.0 allow a local attacker to potentially execute arbitrary code.
[ "cpe:2.3:a:intel:quartus_prime:*:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
CVE-2023-25004
A maliciously crafted pskernel.dll file in Autodesk products is used to trigger integer overflow vulnerabilities. Exploitation of these vulnerabilities may lead to code execution.
[ "cpe:2.3:a:autodesk:alias:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:maya_usd:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:vred:*:*:*:*:*:*:*:*" ]
null
7.8
null
null