id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-r5vj-wcrj-6f7h | Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35792. | [] | null | 7.8 | null | null |
|
GHSA-fhx8-5c23-x7x5 | Cross Site Scripting vulnerability in Contribsys Sidekiq | Cross Site Scripting vulnerability in Contribsys Sidekiq v.6.5.8 allows a remote attacker to obtain sensitive information via a crafted URL to the filter functions. | [] | 5.1 | 6.1 | null | null |
CVE-1999-0832 | Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname. | [
"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-9h27-q32v-cjxq | Mirabilis ICQ WebFront Plug-in ICQ2000b Build 3278 allows a remote attacker to create a denial of service via HTTP URL requests containing a large number of % characters. | [] | null | null | null | null |
|
RHSA-2008:0006 | Red Hat Security Advisory: httpd security update | mod_autoindex XSS httpd: mod_imagemap XSS apache mod_status cross-site scripting mod_proxy_ftp XSS | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2015-8217 | The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2011-2721 | Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.97:rc:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-624h-qqfx-32pv | Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [] | null | null | 7.5 | null |
|
RHSA-2003:269 | Red Hat Security Advisory: : Updated KDE packages fix security issues | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
GHSA-f5x5-65cm-ghxj | quikstore.cgi in QuikStore shopping cart stores quikstore.cfg under the web document root with insufficient access control, which allows remote attackers to obtain the cleartext administrator password and gain privileges. | [] | null | null | null | null |
|
CVE-2008-7111 | The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 does not restrict the filenames or extensions of uploaded files, which makes it easier for remote attackers to execute arbitrary code or overwrite files by leveraging CVE-2008-7110 and CVE-2008-7109. | [
"cpe:2.3:a:kyoceramita:scanner_file_utility:3.3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-879m-9j9j-p69x | Illustrator versions 28.6, 27.9.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-735j-r9q6-48mw | In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion. | [] | null | 7.8 | null | null |
|
CVE-2017-8005 | The EMC RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, and RSA IMG products (RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2, all patch levels; RSA Via Lifecycle and Governance version 7.0, all patch levels; RSA Identity Management and Governance (RSA IMG) versions 6.9.1, all patch levels) are affected by multiple stored cross-site scripting vulnerabilities. Remote authenticated malicious users could potentially inject arbitrary HTML code to the application. | [
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0.0.5:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-9r9h-3x7g-qvjq | PHP remote file inclusion vulnerability in Mantis 0.19.0a allows remote attackers to execute arbitrary PHP code by modifying the (1) t_core_path parameter to bug_api.php or (2) t_core_dir parameter to relationship_api.php to reference a URL on a remote web server that contains the code. | [] | null | null | null | null |
|
GHSA-8pwj-qgrj-p95h | The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory. | [] | null | null | null | null |
|
GHSA-jr3v-xg64-x4c2 | Multiple cross-site scripting (XSS) vulnerabilities in ESRI ArcGIS for Desktop, ArcGIS for Engine, and ArcGIS for Server 10.2.2 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-h3ch-5pp2-vh6w | Improper socket reuse in Apache Tomcat | If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors. | [] | null | 8.6 | null | null |
GHSA-f4cq-9rff-835c | Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. | [] | null | 7 | null | null |
|
GHSA-q6fw-pgc6-r84c | In the Linux kernel, the following vulnerability has been resolved:net: pds_core: Fix possible double free in error handling pathWhen auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), Callback function pdsc_auxbus_dev_release
calls kfree(padev) to free memory. We shouldn't call kfree(padev)
again in the error handling path.Fix this by cleaning up the redundant kfree() and putting
the error handling back to where the errors happened. | [] | null | 4.1 | null | null |
|
GHSA-482j-rhmj-w9w6 | The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'get_calendar_materials' function. The plugin is also vulnerable to SQL Injection via the ‘year’ parameter of that function due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 8.8 | null | null |
|
CVE-2022-28188 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product receives input or data, but does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly, which may lead to denial of service. | [
"cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-wrwc-vgm8-jp23 | Zimbra Collaboration 8.7.x - 8.8.11P2 contains non-persistent XSS. | [] | null | null | null | null |
|
GHSA-qph2-hg7m-9c9w | Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the schedstarttime parameter in the openSchedWifi function. | [] | null | 9.8 | null | null |
|
GHSA-5mmp-m9wh-43v7 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Visser Labs Jigoshop – Store Toolkit allows Reflected XSS.This issue affects Jigoshop – Store Toolkit: from n/a through 1.4.0. | [] | null | 7.1 | null | null |
|
CVE-2020-5514 | Gila CMS 1.11.8 allows Unrestricted Upload of a File with a Dangerous Type via .phar or .phtml to the lzld/thumb?src= URI. | [
"cpe:2.3:a:gilacms:gila_cms:1.11.8:*:*:*:*:*:*:*"
] | null | 9.1 | null | 9 |
|
CVE-2005-2371 | Directory traversal vulnerability in Oracle Reports 6.0, 6i, 9i, and 10g allows remote attackers to overwrite arbitrary files via (1) "..", (2) Windows drive letter (C:), and (3) absolute path sequences in the desname parameter. NOTE: this issue was probably fixed by REP06 in CPU Jan 2006, in which case it overlaps CVE-2006-0289. | [
"cpe:2.3:a:oracle:reports:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:reports:6i:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:reports:9i:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:reports:10g:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-46882 | The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. | [
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-3gqc-x6xc-59jp | SolarWinds TFTP server 5.0.55 and earlier allows remote attackers to cause a denial of service (crash) via a large UDP datagram, possibly triggering a buffer overflow. | [] | null | null | null | null |
|
GHSA-v7ff-8wcx-gmc5 | Authorization Before Parsing and Canonicalization in jetty | Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS. | [] | null | 5.3 | null | null |
CVE-2021-24922 | Pixel Cat Lite < 2.6.2 - CSRF to Stored Cross-Site Scripting | The Pixel Cat WordPress plugin before 2.6.2 does not have CSRF check when saving its settings, and did not sanitise as well as escape some of them, which could allow attacker to make a logged in admin change them and perform Cross-Site Scripting attacks | [
"cpe:2.3:a:fatcatapps:pixel_cat:*:*:*:*:*:wordpress:*:*"
] | null | 9 | null | 6 |
CVE-2022-29797 | There is a buffer overflow vulnerability in CV81-WDM FW 01.70.49.29.46. Successful exploitation of this vulnerability may lead to privilege escalation. | [
"cpe:2.3:o:huawei:cv81-wdm_firmware:01.70.49.29.46:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cv81-wdm:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
RHSA-2021:3252 | Red Hat Security Advisory: python27 security update | python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-pygments: Infinite loop in SML lexer may lead to DoS python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-pygments: ReDoS in multiple lexers python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.8 | null | null |
GHSA-rx32-c25r-79mx | Directory Traversal in serverhuwenhui | Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | null | null | 7.5 | null |
CVE-2020-7081 | A type confusion vulnerability in the Autodesk FBX-SDK versions 2019.0 and earlier may lead to arbitary code read/write on the system running it. | [
"cpe:2.3:a:autodesk:fbx_software_development_kit:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2019-15443 | The Samsung J7 Max Android device with a build fingerprint of samsung/j7maxlteins/j7maxlte:8.1.0/M1AJQ/G615FXXU2BSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [
"cpe:2.3:o:samsung:galaxy_j7_max_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_j7_max:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-6grc-63f9-89vv | The telnet service in LevelOne WBR-3460 4-Port ADSL 2/2+ Wireless Modem Router with firmware 1.00.11 and 1.00.12 does not require authentication, which allows remote attackers on the local or wireless network to obtain administrative access. | [] | null | null | null | null |
|
CVE-2018-13190 | The mintToken function of a smart contract implementation for DVChain, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:dvchain_project:dvchain:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-976g-pwf5-w5v4 | PHP remote file inclusion vulnerability in dix.php3 in PHPartenaire 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the url_phpartenaire parameter. | [] | null | null | null | null |
|
CVE-2006-7042 | Cross-site scripting (XSS) vulnerability in directory/index.php in Chipmunk directory allows remote attackers to inject arbitrary web script or HTML via the start parameter. | [
"cpe:2.3:a:chipmunk_scripts:chipmunk_directory:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-6p42-xfj6-9ggh | In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object. | [] | null | null | 7.8 | null |
|
CVE-2022-2873 | An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2024-55949 | Privilege escalation in IAM import API in MinIO | MinIO is a high-performance, S3 compatible object store, open sourced under GNU AGPLv3 license. Minio is subject to a privilege escalation in IAM import API, all users are impacted since MinIO commit `580d9db85e04f1b63cc2909af50f0ed08afa965f`. This issue has been addressed in commit `f246c9053f9603e610d98439799bdd2a6b293427` which is included in RELEASE.2024-12-13T22-19-12Z. There are no workarounds possible, all users are advised to upgrade immediately. | [] | 9.3 | null | null | null |
GHSA-g49p-q335-6257 | regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion. | [] | null | null | null | null |
|
GHSA-qj6m-6wr4-jg9x | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Howard Ehrenberg Custom Post Carousels with Owl allows Stored XSS.This issue affects Custom Post Carousels with Owl: from n/a through 1.4.6. | [] | null | 6.5 | null | null |
|
CVE-2024-26884 | bpf: Fix hashtab overflow check on 32-bit arches | In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix hashtab overflow check on 32-bit arches
The hashtab code relies on roundup_pow_of_two() to compute the number of
hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code. So apply the same
fix to hashtab, by moving the overflow check to before the roundup. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2024-48234 | An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files. | [
"cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
CVE-2021-37939 | It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP response data on hosts accessible to the cluster. | [
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*"
] | null | 2.7 | null | 4 |
|
CVE-2025-46529 | WordPress Business Contact Widget <= 2.7.0 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StressFree Sites Business Contact Widget allows Stored XSS. This issue affects Business Contact Widget: from n/a through 2.7.0. | [] | null | 5.9 | null | null |
CVE-2024-53724 | WordPress IceStats plugin <= 1.3 - CSRF to Stored Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Ronny L. Bull IceStats allows Stored XSS.This issue affects IceStats: from n/a through 1.3. | [] | null | 7.1 | null | null |
CVE-2020-25359 | An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter and an extension in the ext parameter and delete all the files with that extension in that path. | [
"cpe:2.3:a:rconfig:rconfig:3.9.5:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
RHSA-2024:8826 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update | OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) nimbus-jose-jwt: large JWE p2c header value causes Denial of Service wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.5 | null | null |
GHSA-5xw5-44j8-6h82 | signup_page.php in Mantis bugtracker allows remote attackers to send e-mail bombs by creating multiple users and providing the same e-mail address. | [] | null | null | null | null |
|
CVE-2018-9353 | In ihevcd_parse_slice_data of ihevcd_parse_slice.c there is a possible heap buffer out of bound read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-2239-pmp7-cm44 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Appointment Management System 1.0. Affected by this issue is some unknown functionality of the file /doctor/view-appointment-detail.php. The manipulation of the argument editid leads to improper control of resource identifiers. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-262226 is the identifier assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
GHSA-qmhr-qg6c-738p | Untrusted search path vulnerability in the installer of PlayMemories Home for Windows ver.5.5.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [] | null | null | 7.8 | null |
|
CVE-2025-3902 | Block Class - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-043 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Block Class allows Cross-Site Scripting (XSS).This issue affects Block Class: from 4.0.0 before 4.0.1. | [] | null | 6.1 | null | null |
GHSA-hf5c-8384-6xrf | In ImportVCardActivity, there is a possible way to bypass user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-172252122 | [] | null | 7.3 | null | null |
|
CVE-2022-2776 | SourceCodester Gym Management System delete_user.php denial of service | A vulnerability classified as problematic has been found in SourceCodester Gym Management System. Affected is an unknown function of the file delete_user.php. The manipulation of the argument delete_user leads to denial of service. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-206172. | [
"cpe:2.3:a:gym_management_system_project:gym_management_system:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2018-14637 | The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack. | [
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-9m3r-v8gg-v29j | In certain EZVIZ products, two stack based buffer overflows in mulicast_parse_sadp_packet and mulicast_get_pack_type functions of the SADP multicast protocol can allow an unauthenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. | [] | null | 8.8 | null | null |
|
GHSA-mppp-f7rw-v5g4 | In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed | [] | null | 5.5 | null | null |
|
RHSA-2024:2734 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-urllib3) security update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 4.2 | null | null |
RHSA-2024:0448 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfp: use-after-free in area_cache_get() kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: use-after-free in smb2_is_status_io_timeout() kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: use-after-free in netfilter: nf_tables kernel: use after free in nft_immediate_deactivate kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c amd: Return Address Predictor vulnerability leading to information disclosure kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: eBPF: insufficient stack type checks in dynptr kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy() | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
CVE-2019-7661 | An issue was discovered in PHPMyWind 5.5. The method parameter of the data/api/oauth/connect.php page has a reflected Cross-site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:phpmywind:phpmywind:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-5553-rf4f-g9qc | Files or Directories Accessible to External Parties vulnerability in Agito Computer Health4All allows Exploiting Incorrectly Configured Access Control Security Levels, Authentication Abuse.This issue affects Health4All: before 10.01.2025. | [] | null | 8.3 | null | null |
|
CVE-2024-44302 | The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Processing a maliciously crafted font may result in the disclosure of process memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2015-7993 | The Extended Application Services (aka XS or XS Engine) in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to "HTTP Login," aka SAP Security Note 2197397. | [
"cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2016-6768 | A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31631842. | [
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
ICSA-23-047-13 | Sub-IoT DASH 7 Alliance Protocol stack implementation | The Sub-IoT implementation of the DASH 7 Alliance protocol has a vulnerability that can lead to an out-of-bounds write. If the protocol has been compiled using default settings, this will only grant the attacker access to allocated but unused memory. However, if it was configured using non-default settings, there is the possibility that exploiting this vulnerability could lead to system crashes and remote code execution. CVE-2023-0847 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). | [] | null | null | 5.3 | null |
CVE-2020-12966 | AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor. | [
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-vwp3-9q2r-rpj9 | In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122323053 | [] | null | 5 | null | null |
|
GHSA-2rwq-m686-fwcg | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 7.8 | null |
|
CVE-2023-34985 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters. | [
"cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
|
GHSA-rvv6-3f7f-jg4m | A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service. | [] | null | 5.5 | null | null |
|
RHSA-2003:227 | Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
CVE-2020-35806 | Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, RAX120 before 1.0.0.78, RBK22 before 2.3.5.26, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK40 before 2.3.5.30, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and WN3000RPv2 before 1.0.0.78. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk22_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rpv2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rpv2:-:*:*:*:*:*:*:*"
] | null | 6 | null | null |
|
GHSA-fg4m-w584-q5x8 | A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. | [] | null | 8.6 | null | null |
|
CVE-2024-4751 | WP Prayer II <= 2.4.7 - Settings Update via CSRF | The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack | [
"cpe:2.3:a:goprayer:wp_prayer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:goprayer:wp_prayer:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-h95q-46mc-6g3w | Information disclosure due to buffer over-read in Bluetooth Host while A2DP streaming. | [] | null | 7.5 | null | null |
|
CVE-2021-40023 | Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2008-1389 | libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access." | [
"cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.14:pre:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.80:rc:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.80:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.80:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.81:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.84:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.84:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.86:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.88.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.90.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.90.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.91.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.91.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.93.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-6813 | SQL injection vulnerability in detail.asp in Mxmania File Upload Manager (FUM) 1.0.6 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter. | [
"cpe:2.3:a:mxmania:mxmania_file_upload_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9pv3-7hg6-7xj7 | TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "recHour" parameter in setScheduleCfg. | [] | null | 9.8 | null | null |
|
CVE-2016-1557 | Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP. | [
"cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
CVE-2024-46863 | ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item | In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item
There is no links_num in struct snd_soc_acpi_mach {}, and we test
!link->num_adr as a condition to end the loop in hda_sdw_machine_select().
So an empty item in struct snd_soc_acpi_link_adr array is required. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null |
RHSA-2016:2963 | Red Hat Security Advisory: xen security update | Xen: qemu ioport out-of-bounds array access (XSA-199) | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 7.6 | null |
PYSEC-2018-96 | null | Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid." | [] | null | null | null | null |
CVE-2022-49702 | btrfs: fix hang during unmount when block group reclaim task is running | In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix hang during unmount when block group reclaim task is running
When we start an unmount, at close_ctree(), if we have the reclaim task
running and in the middle of a data block group relocation, we can trigger
a deadlock when stopping an async reclaim task, producing a trace like the
following:
[629724.498185] task:kworker/u16:7 state:D stack: 0 pid:681170 ppid: 2 flags:0x00004000
[629724.499760] Workqueue: events_unbound btrfs_async_reclaim_metadata_space [btrfs]
[629724.501267] Call Trace:
[629724.501759] <TASK>
[629724.502174] __schedule+0x3cb/0xed0
[629724.502842] schedule+0x4e/0xb0
[629724.503447] btrfs_wait_on_delayed_iputs+0x7c/0xc0 [btrfs]
[629724.504534] ? prepare_to_wait_exclusive+0xc0/0xc0
[629724.505442] flush_space+0x423/0x630 [btrfs]
[629724.506296] ? rcu_read_unlock_trace_special+0x20/0x50
[629724.507259] ? lock_release+0x220/0x4a0
[629724.507932] ? btrfs_get_alloc_profile+0xb3/0x290 [btrfs]
[629724.508940] ? do_raw_spin_unlock+0x4b/0xa0
[629724.509688] btrfs_async_reclaim_metadata_space+0x139/0x320 [btrfs]
[629724.510922] process_one_work+0x252/0x5a0
[629724.511694] ? process_one_work+0x5a0/0x5a0
[629724.512508] worker_thread+0x52/0x3b0
[629724.513220] ? process_one_work+0x5a0/0x5a0
[629724.514021] kthread+0xf2/0x120
[629724.514627] ? kthread_complete_and_exit+0x20/0x20
[629724.515526] ret_from_fork+0x22/0x30
[629724.516236] </TASK>
[629724.516694] task:umount state:D stack: 0 pid:719055 ppid:695412 flags:0x00004000
[629724.518269] Call Trace:
[629724.518746] <TASK>
[629724.519160] __schedule+0x3cb/0xed0
[629724.519835] schedule+0x4e/0xb0
[629724.520467] schedule_timeout+0xed/0x130
[629724.521221] ? lock_release+0x220/0x4a0
[629724.521946] ? lock_acquired+0x19c/0x420
[629724.522662] ? trace_hardirqs_on+0x1b/0xe0
[629724.523411] __wait_for_common+0xaf/0x1f0
[629724.524189] ? usleep_range_state+0xb0/0xb0
[629724.524997] __flush_work+0x26d/0x530
[629724.525698] ? flush_workqueue_prep_pwqs+0x140/0x140
[629724.526580] ? lock_acquire+0x1a0/0x310
[629724.527324] __cancel_work_timer+0x137/0x1c0
[629724.528190] close_ctree+0xfd/0x531 [btrfs]
[629724.529000] ? evict_inodes+0x166/0x1c0
[629724.529510] generic_shutdown_super+0x74/0x120
[629724.530103] kill_anon_super+0x14/0x30
[629724.530611] btrfs_kill_super+0x12/0x20 [btrfs]
[629724.531246] deactivate_locked_super+0x31/0xa0
[629724.531817] cleanup_mnt+0x147/0x1c0
[629724.532319] task_work_run+0x5c/0xa0
[629724.532984] exit_to_user_mode_prepare+0x1a6/0x1b0
[629724.533598] syscall_exit_to_user_mode+0x16/0x40
[629724.534200] do_syscall_64+0x48/0x90
[629724.534667] entry_SYSCALL_64_after_hwframe+0x44/0xae
[629724.535318] RIP: 0033:0x7fa2b90437a7
[629724.535804] RSP: 002b:00007ffe0b7e4458 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[629724.536912] RAX: 0000000000000000 RBX: 00007fa2b9182264 RCX: 00007fa2b90437a7
[629724.538156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000555d6cf20dd0
[629724.539053] RBP: 0000555d6cf20ba0 R08: 0000000000000000 R09: 00007ffe0b7e3200
[629724.539956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[629724.540883] R13: 0000555d6cf20dd0 R14: 0000555d6cf20cb0 R15: 0000000000000000
[629724.541796] </TASK>
This happens because:
1) Before entering close_ctree() we have the async block group reclaim
task running and relocating a data block group;
2) There's an async metadata (or data) space reclaim task running;
3) We enter close_ctree() and park the cleaner kthread;
4) The async space reclaim task is at flush_space() and runs all the
existing delayed iputs;
5) Before the async space reclaim task calls
btrfs_wait_on_delayed_iputs(), the block group reclaim task which is
doing the data block group relocation, creates a delayed iput at
replace_file_extents() (called when COWing leaves that have file extent
items pointing to relocated data exten
---truncated--- | [] | null | null | null | null |
CVE-2024-40837 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-7c4f-6qqr-r9w5 | Passgo Defender 5.2 creates the application directory with insecure permissions (Everyone/Full Control), which allows local users to read and modify sensitive files. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2012-5582 | opendnssec misuses libcurl API | [
"cpe:2.3:a:opendnssec:opendnssec:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-792x-pfwg-f6rr | A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258012. | [] | null | 6.3 | null | null |
|
RHSA-2025:3068 | Red Hat Security Advisory: OpenShift Container Platform 4.18.6 packages and security update | go-jose: Go JOSE's Parsing Vulnerable to Denial of Service | [
"cpe:/a:redhat:openshift:4.18::el9"
] | null | 7.5 | null | null |
GHSA-2m5q-52fx-w72m | The kernel extension in Cisco AnyConnect Secure Mobility Client 4.0(2049) on OS X allows local users to cause a denial of service (panic) via vectors involving contiguous memory locations, aka Bug ID CSCut12255. | [] | null | null | null | null |
|
CVE-2013-6993 | Cross-site scripting (XSS) vulnerability in the Ad-minister plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the key parameter in a delete action to wp-admin/tools.php. | [
"cpe:2.3:a:ad-minister_project:ad-minister:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ad-minister_project:ad-minister:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ad-minister_project:ad-minister:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ad-minister_project:ad-minister:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ad-minister_project:ad-minister:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ad-minister_project:ad-minister:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ad-minister_project:ad-minister:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cg28-7vxh-vpfc | login.asp in Ringtail CaseBook 6.1.0 displays different error messages depending on whether a user exists or not, which allows remote attackers to determine valid usernames. | [] | null | null | null | null |
|
GHSA-g669-vf33-57jw | An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing. | [] | null | null | 6.5 | null |
|
GHSA-pgp6-3p5j-wc9h | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Muhammad Junaid Provide Forex Signals allows Stored XSS.This issue affects Provide Forex Signals: from n/a through 1.0. | [] | null | 6.5 | null | null |
|
CVE-2016-8855 | Cross-Site Scripting (XSS) in "/sitecore/client/Applications/List Manager/Taskpages/Contact list" in Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) allows remote attacks via the Name or Description parameter. This is fixed in 8.2 Update-2. | [
"cpe:2.3:a:sitecore:experience_platform:8.1:rev._160519:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.