id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-gfj7-wqvc-jxxf | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
|
GHSA-5r5v-7gvp-6wc7 | A race condition was addressed with improved state handling. This issue is fixed in iOS 14.6 and iPadOS 14.6. An application may be able to cause unexpected system termination or write kernel memory. | [] | null | null | null | null |
|
GHSA-7mjp-h9mr-4jw2 | Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system. | [] | null | null | null | null |
|
CVE-2013-4118 | FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors. | [
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2020:2851 | Red Hat Security Advisory: kernel security and bug fix update | kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: Count overflow in FUSE request leading to use-after-free issues. kernel: use-after-free in arch/x86/lib/insn-eval.c Kernel: KVM: OOB memory access via mmio ring buffer kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.3 | 5.5 | null |
GHSA-jpj8-49hr-wcwv | Drupal Denial of service via transliterate mechanism | The transliterate mechanism in Drupal 8.x before 8.2.3 allows remote attackers to cause a denial of service via a crafted URL. | [] | null | null | 6.5 | null |
GHSA-94xj-6h93-9hj5 | An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233. | [] | null | null | 7.8 | null |
|
RHSA-2021:0694 | Red Hat Security Advisory: bind security update | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.1 | null | null |
GHSA-wqrx-pvqc-vp73 | A vulnerability in the component process.php of QR Code Generator v5.2.7 allows attackers to perform directory traversal. | [] | null | 7.5 | null | null |
|
CVE-2019-2025 | In binder_thread_read of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-116855682References: Upstream kernel | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2017-7918 | An Improper Access Control issue was discovered in Cambium Networks ePMP. After a valid user has used SNMP configuration export, an attacker is able to remotely trigger device configuration backups using specific MIBs. These backups lack proper access control and may allow access to sensitive information and possibly allow for configuration changes. | [
"cpe:2.3:o:cambium_networks:epmp_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cambium_networks:epmp_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambium_networks:epmp_elevate_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cambium_networks:epmp_elevate:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambium_networks:epmp_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cambium_networks:epmp_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambium_networks:epmp_1000_hotspot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cambium_networks:epmp_1000_hotspot:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | 6 |
|
GHSA-rr77-8xvw-xxm9 | The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file. | [] | null | null | 6.5 | null |
|
GHSA-rh9m-9jx7-gq3q | SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache. | [] | null | null | null | null |
|
CVE-2024-13129 | Roxy-WI roxy.py action_service os command injection | A vulnerability was found in Roxy-WI up to 8.1.3. It has been declared as critical. Affected by this vulnerability is the function action_service of the file app/modules/roxywi/roxy.py. The manipulation of the argument action/service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 8.1.4 is able to address this issue. The identifier of the patch is 32313928eb9ce906887b8a30bf7b9a3d5c0de1be. It is recommended to upgrade the affected component. | [] | 8.7 | 8.8 | 8.8 | 9 |
GHSA-c3wf-86mc-7ggp | Buffer over-write when this 0-byte buffer is typecasted to some other structure and hence memory corruption in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile in QCS605, SA6155P, SM8150 | [] | null | null | null | null |
|
GHSA-c988-m9f7-4rc2 | An elevation of privilege vulnerability in the MediaTek touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-30202425. References: M-ALPS02898189. | [] | null | null | 7.8 | null |
|
CVE-2022-24843 | Path Traversal in github.com/flipped-aurora/gin-vue-admin | Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue. | [
"cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
RHSA-2020:4900 | Red Hat Security Advisory: cryptsetup security update | cryptsetup: Out-of-bounds write when validating segments | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
CVE-2023-4688 | Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35433. | [
"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 4.4 | null |
|
CVE-2023-21126 | In bindOutputSwitcherAndBroadcastButton of MediaControlPanel.java, there is a possible launch arbitrary activity under SysUI due to Unsafe Intent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-271846393 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-g575-5h4r-77p9 | IDrive before 6.7.3.19 on Windows installs by default to %PROGRAMFILES(X86)%\IDriveWindows with weak folder permissions granting any user modify permission (i.e., NT AUTHORITY\Authenticated Users:(OI)(CI)(M)) to the contents of the directory and its sub-folders. In addition, the program installs a service called IDriveService that runs as LocalSystem. Thus, any standard user can escalate privileges to NT AUTHORITY\SYSTEM by substituting the service's binary with a malicious one. | [] | null | null | null | null |
|
GHSA-7jfp-7w7f-mfcm | Cross-site scripting vulnerability in Internet Explorer 6 earlier allows remote attackers to execute arbitrary script via an Extended HTML Form, whose output from the remote server is not properly cleansed. | [] | null | null | null | null |
|
GHSA-69r8-v874-fjmf | Zoho ManageEngine ADManager Plus version 7110 and prior is vulnerable to unrestricted file upload, leading to remote code execution. | [] | null | null | null | null |
|
ICSA-22-349-15 | Siemens Teamcenter Visualization and JT2Go | The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. The APDFL.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. The APDFL.dll contains a memory corruption vulnerability while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. | [] | null | 7.8 | null | null |
CVE-2004-2387 | Buffer overflow in the HandleCPCCommand function of sercd before 2.3.1 and sredird 2.2.1 and earlier allows remote attackers to execute arbitrary code. | [
"cpe:2.3:a:denis_sbragion:sredird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:denis_sbragion:sredird:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:peter_astrand:sercd:2.3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-vcc9-rv8j-j9mr | Unspecified vulnerability in the PeopleSoft Enterprise HCM Talent Acquisition Manager component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote attackers to affect integrity via unknown vectors related to Security. | [] | null | null | null | null |
|
CVE-2017-5646 | For versions of Apache Knox from 0.2.0 to 0.11.0 - an authenticated user may use a specially crafted URL to impersonate another user while accessing WebHDFS through Apache Knox. This may result in escalated privileges and unauthorized data access. While this activity is audit logged and can be easily associated with the authenticated user, this is still a serious security issue. All users are recommended to upgrade to the Apache Knox 0.12.0 release. | [
"cpe:2.3:a:apache:knox:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:knox:0.11.0:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.9 |
|
CVE-2018-12793 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-31913 | IBM Sterling B2B Integrator cross-site scripting | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.5:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.2:*:*:*:standard:*:*:*"
] | null | 5.5 | null | null |
GHSA-2w4f-8m3p-jrxr | A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment. | [] | null | 6.1 | null | null |
|
GHSA-w6wp-h5mf-m3p9 | SQL injection vulnerability in HITSENSER Data Mart Server BS, BS-S, BS-M, BS-L, and EX allows remote attackers to execute arbitrary SQL commands via unknown attack vectors. | [] | null | null | null | null |
|
GHSA-frhw-w3wm-6cw4 | NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code running in the host’s network namespace. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to denial of service and escalation of privileges. | [] | null | 5.5 | null | null |
|
GHSA-94x7-g9v4-xqvc | Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/admin/?page=agents/manage_agent. | [] | null | 9.8 | null | null |
|
GHSA-3vf5-xm2p-6mh5 | Cockpit Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.2 and prior. A patch is available at commit 34ab31ee9362da51b9709e178469dbffd7717249. | [] | null | null | 8.3 | null |
CVE-2013-6974 | Cross-site scripting (XSS) vulnerability in the web interface in Cisco Secure Access Control System (ACS) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCud89431. | [
"cpe:2.3:a:cisco:secure_access_control_system:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-1949 | A race condition in Mattermost versions 8.1.x before 8.1.9, and 9.4.x before 9.4.2 allows an authenticated attacker to gain unauthorized access to individual posts' contents via carefully timed post creation while another user deletes posts.
| [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 2.6 | null | null |
|
GHSA-vp54-8459-j943 | AASync.com AASync version 2.2.1.0 suffers from an instance of CWE-121: Stack-based Buffer Overflow. | [] | null | null | null | null |
|
GHSA-949h-c8q7-ffm5 | A vulnerability in the listing of available software of SUSE Studio Onsite, SUSE Studio Onsite 1.1 Appliance allows authenticated users to execute arbitrary SQL statements via SQL injection. Affected releases are SUSE Studio Onsite: versions prior to 1.0.3-0.18.1, SUSE Studio Onsite 1.1 Appliance: versions prior to 1.1.2-0.25.1. | [] | null | null | 8.8 | null |
|
GHSA-hwqr-f3v9-hwxr | Workers for local Dask clusters mistakenly listened on public interfaces | Versions of `distributed` earlier than `2021.10.0` had a potential security vulnerability relating to single-machine Dask clusters.Clusters started with `dask.distributed.LocalCluster` or `dask.distributed.Client()` (which defaults to using `LocalCluster`) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on `localhost`. A Dask cluster created using this method AND running on a machine that has these ports exposed could be used by a sophisticated attacker to enable remote code execution. Users running on machines with standard firewalls in place, or using clusters created via cluster objects other than `LocalCluster` (e.g. `dask_kubernetes.KubeCluster`) should not be affected. This vulnerability is documented in CVE-2021-42343, and was fixed in version `2021.10.0` (PR #5427). | [] | 9.3 | 9.8 | null | null |
CVE-2022-28544 | Path traversal vulnerability in unzip method of InstallAgentCommonHelper in Galaxy store prior to version 4.5.40.5 allows attacker to access the file of Galaxy store. | [
"cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
CVE-2014-8499 | Multiple SQL injection vulnerabilities in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allow remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter to (1) SQLAdvancedALSearchResult.cc or (2) AdvancedSearchResult.cc. | [
"cpe:2.3:a:manageengine:password_manager_pro:*:build_7104:*:*:*:*:*:*",
"cpe:2.3:a:manageengine:password_manager_pro:*:build_7104:*:*:managed_service_providers:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-5429 | Logo Slider < 4.1.0 - Contributor+ Stored XSS | The Logo Slider WordPress plugin before 4.1.0 does not validate and escape some of its Slider Settings before outputting them back in attributes, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:logichunt:logo_slider:*:*:*:*:*:wordpress:*:*"
] | null | 7.6 | null | null |
CVE-2008-1315 | SQL injection vulnerability in the ZClassifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter to modules.php. | [
"cpe:2.3:a:php-nuke:zclassifieds:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-23808 | Arkcompiler ets frontend has an out-of-bounds read vulnerability | in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference. | [
"cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*",
"cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*"
] | null | 5.2 | null | null |
CVE-2024-27197 | WordPress BeePress plugin <= 6.9.8 - CSRF to Stored Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Bee BeePress allows Stored XSS.This issue affects BeePress: from n/a through 6.9.8.
| [] | null | 7.1 | null | null |
CVE-2022-38467 | WordPress CRM Perks Forms Plugin <= 1.1.0 is vulnerable to Reflected Cross Site Scripting (XSS) vulnerability | Reflected Cross-Site Scripting (XSS) vulnerability in CRM Perks Forms – WordPress Form Builder <= 1.1.0 ver. | [
"cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2021-42648 | Cross-site scripting (XSS) vulnerability exists in Coder Code-Server before 3.12.0, allows attackers to execute arbitrary code via crafted URL. | [
"cpe:2.3:a:coder:code-server:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-gwmc-cj2r-4xqg | Cross-site scripting (XSS) vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page. | [] | null | null | null | null |
|
CVE-2025-31909 | WordPress Apptivo Business Site CRM plugin <= 5.3 - Arbitrary Content Deletion vulnerability | Missing Authorization vulnerability in NotFound Apptivo Business Site CRM allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Apptivo Business Site CRM: from n/a through 5.3. | [] | null | 7.5 | null | null |
CVE-2021-21550 | Dell EMC PowerScale OneFS 8.1.0-9.1.0 contain an improper neutralization of special elements used in an OS command vulnerability. This vulnerability can allow an authenticated user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE privileges to escalate privileges. | [
"cpe:2.3:o:dell:emc_powerscale_onefs:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:9.1.0.0:*:*:*:*:*:*:*"
] | null | 6 | null | null |
|
CVE-2018-10840 | Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 5.2 | null |
|
GHSA-wprp-q629-mgxj | etc/inc/certs.inc in the PKI implementation in pfSense before 2.0.1 creates each X.509 certificate with a true value for the CA basic constraint, which allows remote attackers to create sub-certificates for arbitrary subjects by leveraging the private key. | [] | null | null | null | null |
|
CVE-2020-1028 | A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1126, CVE-2020-1136, CVE-2020-1150. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2021-26891 | Windows Container Execution Agent Elevation of Privilege Vulnerability | Windows Container Execution Agent Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2020-9395 | An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer. | [
"cpe:2.3:o:realtek:rtl8711af_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8711af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:rtl8711am_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8711am:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:rtl8195am_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8195am:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:rtl8710af_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8710af:-:*:*:*:*:*:*:*"
] | null | 8 | null | 4.9 |
|
CVE-2021-30688 | A malicious application may be able to break out of its sandbox. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A path handling issue was addressed with improved validation. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 4.6 |
|
CVE-2010-3861 | The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-ccqw-rpfw-2m25 | certain VT-d IOMMUs may not work in shared page table mode For efficiency reasons, address translation control structures (page tables) may (and, on suitable hardware, by default will) be shared between CPUs, for second-level translation (EPT), and IOMMUs. These page tables are presently set up to always be 4 levels deep. However, an IOMMU may require the use of just 3 page table levels. In such a configuration the lop level table needs to be stripped before inserting the root table's address into the hardware pagetable base register. When sharing page tables, Xen erroneously skipped this stripping. Consequently, the guest is able to write to leaf page table entries. | [] | null | 8.8 | null | null |
|
CVE-2014-4894 | The MyMetro (aka com.myrippleapps.mymetro) application 2.4.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:mymetro_project:mymetro:2.4.7:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-2jx2-r7f9-93pw | Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product. | [] | null | 5.4 | null | null |
|
CVE-2024-39428 | In trusty service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
CVE-2018-9079 | Iomega and LenovoEMC NAS Web UI Vulnerabilities | For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, adversaries can craft URLs to modify the Document Object Model (DOM) of the page. In addition, adversaries can inject HTML script tags and HTML tags with JavaScript handlers to execute arbitrary JavaScript with the origin of the device. | [
"cpe:2.3:o:lenovo:storcenter_px12-450r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_px12-450r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_px12-400r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_px12-400r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_px4-300r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_px4-300r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_px6-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_px6-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_px4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_px4-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_px2-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_px2-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_ix4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_ix4-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_ix2_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_ix2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storcenter_ix2-dl_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storcenter_ix2-dl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ez_media_\\&_backup_center_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ez_media_\\&_backup_center:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px12-450r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px12-450r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px12-400r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px12-400r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px4-400r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px4-400r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px4-300r_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px4-300r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px6-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px6-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px4-400d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px4-400d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px4-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:px2-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px2-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ix4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ix4-300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ix2_firmware:4.1.402.34662:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ix2:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
GHSA-9f8x-24h4-4p65 | Format string vulnerability in the _Eventlog function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to execute arbitrary code via format string specifiers located after a | (pipe) character in a string. NOTE: this might overlap CVE-2010-3059. | [] | null | null | null | null |
|
RHSA-2023:4770 | Red Hat Security Advisory: cups security update | cups: Information leak through Cups-Get-Document operation | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
GHSA-9954-8wq3-xgxf | A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. | [] | null | 7.2 | null | null |
|
GHSA-w983-x7cf-qq48 | In the Linux kernel, the following vulnerability has been resolved:ftrace: Fix use-after-free for dynamic ftrace_opsKASAN reported a use-after-free with ftrace ops [1]. It was found from
vmcore that perf had registered two ops with the same content
successively, both dynamic. After unregistering the second ops, a
use-after-free occurred.In ftrace_shutdown(), when the second ops is unregistered, the
FTRACE_UPDATE_CALLS command is not set because there is another enabled
ops with the same content. Also, both ops are dynamic and the ftrace
callback function is ftrace_ops_list_func, so the
FTRACE_UPDATE_TRACE_FUNC command will not be set. Eventually the value
of 'command' will be 0 and ftrace_shutdown() will skip the rcu
synchronization.However, ftrace may be activated. When the ops is released, another CPU
may be accessing the ops. Add the missing synchronization to fix this
problem.[1]
BUG: KASAN: use-after-free in __ftrace_ops_list_func kernel/trace/ftrace.c:7020 [inline]
BUG: KASAN: use-after-free in ftrace_ops_list_func+0x2b0/0x31c kernel/trace/ftrace.c:7049
Read of size 8 at addr ffff56551965bbc8 by task syz-executor.2/14468CPU: 1 PID: 14468 Comm: syz-executor.2 Not tainted 5.10.0 #7
Hardware name: linux,dummy-virt (DT)
Call trace:
dump_backtrace+0x0/0x40c arch/arm64/kernel/stacktrace.c:132
show_stack+0x30/0x40 arch/arm64/kernel/stacktrace.c:196
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b4/0x248 lib/dump_stack.c:118
print_address_description.constprop.0+0x28/0x48c mm/kasan/report.c:387
__kasan_report mm/kasan/report.c:547 [inline]
kasan_report+0x118/0x210 mm/kasan/report.c:564
check_memory_region_inline mm/kasan/generic.c:187 [inline]
__asan_load8+0x98/0xc0 mm/kasan/generic.c:253
__ftrace_ops_list_func kernel/trace/ftrace.c:7020 [inline]
ftrace_ops_list_func+0x2b0/0x31c kernel/trace/ftrace.c:7049
ftrace_graph_call+0x0/0x4
__might_sleep+0x8/0x100 include/linux/perf_event.h:1170
__might_fault mm/memory.c:5183 [inline]
__might_fault+0x58/0x70 mm/memory.c:5171
do_strncpy_from_user lib/strncpy_from_user.c:41 [inline]
strncpy_from_user+0x1f4/0x4b0 lib/strncpy_from_user.c:139
getname_flags+0xb0/0x31c fs/namei.c:149
getname+0x2c/0x40 fs/namei.c:209
[...]Allocated by task 14445:
kasan_save_stack+0x24/0x50 mm/kasan/common.c:48
kasan_set_track mm/kasan/common.c:56 [inline]
__kasan_kmalloc mm/kasan/common.c:479 [inline]
__kasan_kmalloc.constprop.0+0x110/0x13c mm/kasan/common.c:449
kasan_kmalloc+0xc/0x14 mm/kasan/common.c:493
kmem_cache_alloc_trace+0x440/0x924 mm/slub.c:2950
kmalloc include/linux/slab.h:563 [inline]
kzalloc include/linux/slab.h:675 [inline]
perf_event_alloc.part.0+0xb4/0x1350 kernel/events/core.c:11230
perf_event_alloc kernel/events/core.c:11733 [inline]
__do_sys_perf_event_open kernel/events/core.c:11831 [inline]
__se_sys_perf_event_open+0x550/0x15f4 kernel/events/core.c:11723
__arm64_sys_perf_event_open+0x6c/0x80 kernel/events/core.c:11723
[...]Freed by task 14445:
kasan_save_stack+0x24/0x50 mm/kasan/common.c:48
kasan_set_track+0x24/0x34 mm/kasan/common.c:56
kasan_set_free_info+0x20/0x40 mm/kasan/generic.c:358
__kasan_slab_free.part.0+0x11c/0x1b0 mm/kasan/common.c:437
__kasan_slab_free mm/kasan/common.c:445 [inline]
kasan_slab_free+0x2c/0x40 mm/kasan/common.c:446
slab_free_hook mm/slub.c:1569 [inline]
slab_free_freelist_hook mm/slub.c:1608 [inline]
slab_free mm/slub.c:3179 [inline]
kfree+0x12c/0xc10 mm/slub.c:4176
perf_event_alloc.part.0+0xa0c/0x1350 kernel/events/core.c:11434
perf_event_alloc kernel/events/core.c:11733 [inline]
__do_sys_perf_event_open kernel/events/core.c:11831 [inline]
__se_sys_perf_event_open+0x550/0x15f4 kernel/events/core.c:11723
[...] | [] | null | 7.8 | null | null |
|
CVE-2008-4025 | Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via (1) an RTF file or (2) a rich text e-mail message containing an invalid number of points for a polyline or polygon, which triggers a heap-based buffer overflow, aka "Word RTF Object Parsing Vulnerability." | [
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_outlook:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_outlook:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:office_system:*:2007:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:office_system:sp1:2007:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-8rx8-8w3f-mvq2 | In Bluetooth, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-209062898 | [] | null | 6.8 | null | null |
|
GHSA-xqvj-56p9-pp9r | Multiple SQL injection vulnerabilities in Symantec Altiris WISE Package Studio before 8.0MR1 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] | null | null | null | null |
|
CVE-2021-23848 | Reflected XSS in URL handler | An error in the URL handler Bosch IP cameras may lead to a reflected cross site scripting (XSS) in the web-based interface. An attacker with knowledge of the camera address can send a crafted link to a user, which will execute javascript code in the context of the user. | [
"cpe:2.3:o:bosch:cpp4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp7.3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp7.3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp13_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp13:-:*:*:*:*:*:*:*"
] | null | 8.3 | null | null |
GHSA-mw88-7r4g-9xw8 | "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue affected versions prior to iOS 12.1.1, Safari 12.0.2. | [] | null | null | 4.3 | null |
|
CVE-2020-8497 | In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps. | [
"cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2025-5446 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_checkCredentialsByBBS os command injection | A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2017-9525 | In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs. | [
"cpe:2.3:a:cron_project:cron:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 6.9 |
|
GHSA-p79w-c4cx-pj58 | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 5.3 | null |
|
CVE-2024-25921 | WordPress Action Network plugin <= 1.4.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Concerted Action Action Network allows Reflected XSS.This issue affects Action Network: from n/a through 1.4.2.
| [] | null | 7.1 | null | null |
GHSA-rcxw-34rv-cghv | Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive. | [] | null | null | null | null |
|
CVE-2013-5016 | Symantec Critical System Protection (SCSP) before 5.2.9, when installed on an unpatched Windows Server 2003 R2 platform, allows remote attackers to bypass policy settings via unspecified vectors. | [
"cpe:2.3:a:broadcom:symantec_critical_system_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
CVE-2006-0550 | Buffer overflow in an unspecified Oracle Client utility might allow remote attackers to execute arbitrary code or cause a denial of service. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DBC02 from the January 2006 CPU, in which case this would be a duplicate of CVE-2006-0283. However, there are enough inconsistencies that the mapping can not be made authoritatively. | [
"cpe:2.3:a:oracle:oracle_client:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-6844 | The registration view (/user/register) in eZ Publish 3.5.6 and earlier, and possibly other versions before 3.9.5, 3.10.1, and 4.0.1, allows remote attackers to gain privileges as other users via modified ContentObjectAttribute_data_user_login_30, ContentObjectAttribute_data_user_password_30, and other parameters. | [
"cpe:2.3:a:ez:ez_publish:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2015-4164 | The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set. | [
"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-8wfc-6m4r-hvmp | licq before 1.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | null | null | null | null |
|
CVE-2024-34256 | OFCMS V1.1.2 is vulnerable to SQL Injection via the new table function. | [
"cpe:2.3:a:ofcms_project:ofcms:1.1.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-1952 | Mattermost version 8.1.x before 8.1.9 fails to sanitize data associated with permalinks when a plugin updates an ephemeral post, allowing an authenticated attacker who can control the ephemeral post update to access individual posts' contents in channels they are not a member of.
| [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null |
|
CVE-2023-40141 | In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-5q23-9w8r-f4xx | PDF-XChange Editor TIF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TIF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19638. | [] | null | null | 7.8 | null |
|
CVE-2023-33361 | Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php. | [
"cpe:2.3:a:piwigo:piwigo:13.6.0:-:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2008-6220 | SQL injection vulnerability in login.php in Simple Document Management System (SDMS) 1.1.5 and 1.1.4, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the pass parameter. | [
"cpe:2.3:a:cafuego:simple_document_management_system:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cafuego:simple_document_management_system:1.1.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2009-0631 | Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet. | [
"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ira:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2see:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sef:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2seg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2srd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ste:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xna:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2009-4555 | Multiple cross-site request forgery (CSRF) vulnerabilities in AgoraCart 5.2.005 and 5.2.006 and AgoraCart GOLD 5.5.005 allow remote attackers to hijack the authentication of administrators for requests that (1) modify a .htaccess file via an unspecified request to protected/manager.cgi or (2) change the password of an administrative account. | [
"cpe:2.3:a:k-factor:agoracart:-:gold:*:*:*:*:*:*",
"cpe:2.3:a:k-factor:agoracart:5.2.005:*:*:*:*:*:*:*",
"cpe:2.3:a:k-factor:agoracart:5.2.006:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2018-4268 | A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS High Sierra 10.13.6. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-j9f8-8h89-j69x | Remote Code Execution in node-os-utils | Versions of `node-os-utils` prior to 1.1.0 are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.RecommendationUpgrade to version 1.1.0 or later. | [] | null | 7.3 | null | null |
CVE-2024-4706 | WordPress + Microsoft Office 365 / Azure AD | LOGIN <= 27.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via pintra Shortcode | The WordPress + Microsoft Office 365 / Azure AD | LOGIN plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pintra' shortcode in all versions up to, and including, 27.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-mv8m-8x97-937q | TensorFlow vulnerable to `CHECK` fail in `tf.random.gamma` | ImpactWhen `tf.random.gamma` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack.PatchesWe have patched the issue in GitHub commit [552bfced6ce4809db5f3ca305f60ff80dd40c5a3](https://github.com/tensorflow/tensorflow/commit/552bfced6ce4809db5f3ca305f60ff80dd40c5a3).The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by 刘力源, Information System & Security and Countermeasures Experiments Center, Beijing Institute of Technology. | [] | null | 5.9 | null | null |
RHSA-2023:6497 | Red Hat Security Advisory: libX11 security update | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.3 | null | null |
GHSA-wgxw-qpwc-vh83 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Album Reviewer allows Stored XSS. This issue affects Album Reviewer: from n/a through 2.0.2. | [] | null | 7.1 | null | null |
|
CVE-2020-0746 | An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 5 |
|
CVE-2025-48260 | WordPress GDPR CCPA Compliance Support <= 2.7.3 - Broken Access Control Vulnerability | Missing Authorization vulnerability in Ninja Team GDPR CCPA Compliance Support allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GDPR CCPA Compliance Support: from n/a through 2.7.3. | [] | null | 4.3 | null | null |
CVE-2022-26887 | Delta Electronics DIAEnergie SQL Injection in DIAE_HandlerTag_KID.ashx | Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_loopmapHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands. | [
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.