id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2013-0757 | The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2007-5838 | Aclient in Symantec Altiris Deployment Solution 6.x before 6.8.380.0 allows local users to gain local System privileges via the "Enable key-based authentication to Deployment server" browser option, a different issue than CVE-2007-4380. | [
"cpe:2.3:a:symantec:altiris_deployment_solution:6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp2:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-qv39-hg6q-9r5r | In the Linux kernel, the following vulnerability has been resolved:vfs: Don't evict inode under the inode lru traversing contextThe inode reclaiming process(See function prune_icache_sb) collects all
reclaimable inodes and mark them with I_FREEING flag at first, at that
time, other processes will be stuck if they try getting these inodes
(See function find_inode_fast), then the reclaiming process destroy the
inodes by function dispose_list(). Some filesystems(eg. ext4 with
ea_inode feature, ubifs with xattr) may do inode lookup in the inode
evicting callback function, if the inode lookup is operated under the
inode lru traversing context, deadlock problems may happen.Case 1: In function ext4_evict_inode(), the ea inode lookup could happen
if ea_inode feature is enabled, the lookup process will be stuck
under the evicting context like this:File A has inode i_reg and an ea inode i_eagetfattr(A, xattr_buf) // i_ea is added into lru // lru->i_eaThen, following three processes running like this:PA PB
echo 2 > /proc/sys/vm/drop_caches
shrink_slab
prune_dcache_sb
// i_reg is added into lru, lru->i_ea->i_reg
prune_icache_sb
list_lru_walk_one
inode_lru_isolate
i_ea->i_state |= I_FREEING // set inode state
inode_lru_isolate
__iget(i_reg)
spin_unlock(&i_reg->i_lock)
spin_unlock(lru_lock)
rm file A
i_reg->nlink = 0
iput(i_reg) // i_reg->nlink is 0, do evict
ext4_evict_inode
ext4_xattr_delete_inode
ext4_xattr_inode_dec_ref_all
ext4_xattr_inode_iget
ext4_iget(i_ea->i_ino)
iget_locked
find_inode_fast
__wait_on_freeing_inode(i_ea) ----→ AA deadlock
dispose_list // cannot be executed by prune_icache_sb
wake_up_bit(&i_ea->i_state)Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file
deleting process holds BASEHD's wbuf->io_mutex while getting the
xattr inode, which could race with inode reclaiming process(The
reclaiming process could try locking BASEHD's wbuf->io_mutex in
inode evicting function), then an ABBA deadlock problem would
happen as following:File A has inode ia and a xattr(with inode ixa), regular file B has
inode ib and a xattr.getfattr(A, xattr_buf) // ixa is added into lru // lru->ixaThen, following three processes running like this:rm file A
iput(ia)
ubifs_evict_inode(ia)
ubifs_jnl_delete_inode(ia)
ubifs_jnl_write_inode(ia)
make_reservation(BASEHD) // Lock wbuf->io_mutex
ubifs_iget(ixa->i_ino)
iget_locked
find_inode_fast
__wait_on_freeing_inode(ixa)
| iput(ib) // ib->nlink is 0, do evict
| ubifs_evict_inode
| ubifs_jnl_delete_inode(ib)
↓ ubifs_jnl_write_inode
ABBA deadlock ←-----make_reservation(BASEHD)
dispose_list // cannot be executed by prune_icache_sb
wake_up_bit(&ixa->i_state)Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING
to pin the inode in memory while inode_lru_isolate(
---truncated--- | [] | null | 4.7 | null | null |
|
CVE-2024-1125 | The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the calendar_events_delete() function in all versions up to, and including, 3.4.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary posts. | [] | null | 6.5 | null | null |
|
CVE-2024-49779 | IBM OpenPages cross-site request forgery | IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages
could allow a remote attacker to bypass security restrictions, caused by improper validation and management of authentication cookies. By modifying the CSRF token and Session Id cookie parameters using the cookies of another user, a remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to the vulnerable application. | [] | null | 4.3 | null | null |
CVE-2025-28135 | TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in downloadFile.cgi. | [] | null | 7.5 | null | null |
|
GHSA-p5gq-pr27-wq97 | SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows execution of scripts in the export dialog box of the report name resulting in reflected Cross-Site Scripting. | [] | null | 5.4 | null | null |
|
CVE-2024-49806 | IBM Security Verify Access Appliance hard coded credentials | IBM Security Verify Access Appliance 10.0.0 through 10.0.8
contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | [
"cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.8:*:*:*:*:*:*:*"
] | null | 9.4 | null | null |
CVE-2018-21240 | An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows memory consumption via an ArrayBuffer(0xfffffffe) call. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-442h-g8gm-9284 | Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). | [] | null | 7.5 | null | null |
|
GHSA-vc9p-pxc7-xfc8 | The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors. | [] | null | null | 4.3 | null |
|
CVE-2017-18362 | ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication. | [
"cpe:2.3:a:connectwise:manageditsync:*:*:*:*:*:kaseya_vsa:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-mx5j-m2q8-9rc2 | Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [] | null | 7.5 | null | null |
|
CVE-2012-5424 | Cisco Secure Access Control System (ACS) 5.x before 5.2 Patch 11 and 5.3 before 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote attackers to bypass authentication by sending a valid username and a crafted password string, aka Bug ID CSCuc65634. | [
"cpe:2.3:a:cisco:secure_access_control_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:5.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-21290 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2007-5487 | Stack-based buffer overflow in COWON America jetAudio Basic 7.0.3 allows user-assisted remote attackers to execute arbitrary code via a long URL in an EXTM3U section of a .m3u file. | [
"cpe:2.3:a:cowon_america:jetaudio:7.0.3_basic:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-vw83-h3mq-3qwj | Path Traversal in Spring-integration-zip | Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. | [] | null | 5.3 | null | null |
CVE-2005-1260 | bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb"). | [
"cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2016-4787 | Pulse Connect Secure (PCS) 8.2 before 8.2r1, 8.1 before 8.1r2, 8.0 before 8.0r10, and 7.4 before 7.4r13.4 allow remote attackers to read sensitive system authentication files in an unspecified directory via unknown vectors. | [
"cpe:2.3:a:ivanti:connect_secure:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1r1.0:*:*:*:*:*:*:*"
] | null | null | 10 | 6.4 |
|
CVE-2024-24849 | WordPress Quicksand Post Filter jQuery Plugin Plugin <= 3.1.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Mark Stockton Quicksand Post Filter jQuery Plugin.This issue affects Quicksand Post Filter jQuery Plugin: from n/a through 3.1.1.
| [] | null | 4.3 | null | null |
GHSA-7mf9-hpfc-qqgh | The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the success.php fort_id parameter. | [] | null | null | 6.1 | null |
|
PYSEC-2021-337 | null | This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | [] | null | null | null | null |
CVE-2023-43866 | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard7 function. | [
"cpe:2.3:h:d-link:dir-619l:b1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-619l_firmware:2.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-q8ch-v2v3-qvch | In 1x in all Android releases from CAF using the Linux kernel, a Signed to Unsigned Conversion Error could potentially occur. | [] | null | null | 7.8 | null |
|
GHSA-fxxr-m87j-8c2j | PHPSHE 1.7 has SQL injection via the admin.php?mod=order state parameter. | [] | null | null | 7.2 | null |
|
GHSA-6gg6-vw3j-g8pq | Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. | [] | null | null | 7.8 | null |
|
CVE-2005-1669 | Cross-site scripting (XSS) vulnerability in Opera 8.0 Final Build 1095 allows remote attackers to inject arbitrary web script or HTML via "javascript:" URLs when a new window or frame is opened, which allows remote attackers to bypass access restrictions and perform unauthorized actions on other domains. | [
"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-8r35-6q65-m8qm | A vulnerability in filesystem usage management for Cisco Firepower Device Manager (FDM) Software could allow an authenticated, remote attacker to exhaust filesystem resources, resulting in a denial of service (DoS) condition on an affected device. This vulnerability is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability by uploading files to the device and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. Manual intervention is required to free filesystem resources and return the device to an operational state. | [] | null | null | null | null |
|
CVE-2013-3448 | Cisco WebEx Meetings Server does not check whether a user account is active, which allows remote authenticated users to bypass intended access restrictions by performing meeting operations after account deactivation, aka Bug ID CSCuh33315. | [
"cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2015-1736 | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1731, CVE-2015-1737, and CVE-2015-1755. | [
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2021-33647 | When performing the inference shape operation of the Tile operator, if the input data type is not int or int32, it will access data outside of bounds of heap allocated buffers. | [
"cpe:2.3:a:mindspore:mindspore:*:*:*:*:*:openeuler:*:*",
"cpe:2.3:a:mindspore:mindspore:0.7.0:beta:*:*:*:openeuler:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-q4xx-x8xv-m6gr | Xerox WorkCentre and WorkCentre Pro 232, 238, 245, 255, 265, 275; and WorkCentre 5632, 5638, 5645, 5655, 5665, 5675, 5687, 7655, 7656, and 7675 allows remote attackers to execute arbitrary commands via unknown attack vectors, aka "command injection vulnerability." | [] | null | null | null | null |
|
CVE-2004-0714 | Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). | [
"cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ons_15454e_optical_transport_platform:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-30640 | Auth weakness in JNDIRealm | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:20.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 5.8 |
CVE-2019-3837 | It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption. | [
"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
CVE-2014-2410 | Unspecified vulnerability in Oracle Java SE 8 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX. | [
"cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-33507 | KramerAV VIA GO² < 4.0.1.1326 is vulnerable to Unauthenticated arbitrary file read. | [
"cpe:2.3:o:kramerav:via_go2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:kramerav:via_go2:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-2vp7-qv46-68wp | SOPlanning 1.45 allows XSS via the "Your SoPlanning url" field. | [] | null | null | null | null |
|
GHSA-h2p2-w857-329f | HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31. | [] | null | 9.1 | null | null |
|
RHSA-2022:1010 | Red Hat Security Advisory: rh-mariadb103-mariadb security and bug fix update | mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.5 | null | null |
CVE-2007-6654 | Buffer overflow in a certain ActiveX control in Macrovision InstallShield Update Service Web Agent 5.1.100.47363 allows remote attackers to execute arbitrary code via a long string in the ProductCode argument (second argument) to the DownloadAndExecute method, a different vulnerability than CVE-2007-0321, CVE-2007-2419, and CVE-2007-5660. | [
"cpe:2.3:a:macrovision:update_service:5.1.100_47363:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-gm65-9xpq-9g64 | An exploitable stack buffer overflow vulnerability exists in the MQTT packet parsing functionality of Cesanta Mongoose 6.8. A specially crafted MQTT SUBSCRIBE packet can cause a stack buffer overflow resulting in remote code execution. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability. | [] | null | null | 9.8 | null |
|
GHSA-xp5x-9h6p-q3rf | A CWE-918 Server-Side Request Forgery (SSRF) vulnerability exists that could cause the station web server to forward requests to unintended network targets when crafted malicious parameters are submitted to the charging station web server. Affected Products: EVlink City EVC1S22P4 / EVC1S7P4 (All versions prior to R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (All versions prior to R8 V3.4.0.2), and EVlink Smart Wallbox EVB1A (All versions prior to R8 V3.4.0.2) | [] | null | null | null | null |
|
GHSA-q68g-r62p-226p | IBM API Connect 2018.1 through 2018.4.1.6 developer portal could allow an unauthorized user to cause a denial of service via an unprotected API. IBM X-Force ID: 162263. | [] | null | null | null | null |
|
CVE-2023-43574 | A buffer over-read was reported in the LEMALLDriversConnectedEventHook module in some Lenovo Desktop products that may allow a local attacker with elevated privileges
to disclose sensitive information.
| [
"cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5_14irb8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5_14irb8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_70t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_70t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_50t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_50t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:o5nkt33a:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920z_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920z_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90q_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90q_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90q_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90q_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_pro_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_pro_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80q_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80q_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75t_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75t_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75s_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75q_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75q_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70q_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70q_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70a_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70a_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:loq_17irb8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:loq_17irb8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t5_26iab7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t5_26iab7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t7-34iaz7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t7-34iaz7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t7_34irz8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t7_34irz8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t5_26irb8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t5_26irb8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_mini_5_01iaq7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_mini_5_01iaq7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_5_27iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_5_27iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_5_24iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_5_24iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-27imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-27imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_27iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_27iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_24iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_24iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_22iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_22iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_21itl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_21itl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-22iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-22itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-22itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-24iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-24itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-24itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50a-22imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50a-24imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50s-07imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13imh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13imh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13iob_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13iob:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_aio_7_27arh7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_aio_7_27arh7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_aio_7-27arh6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_aio_7-27arh6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkedge_se30_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p920_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p720_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520c_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520c_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p360_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_ultra_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p360_ultra_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_tiny_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p360_tiny_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p358_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p358_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p350_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p350_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p350_tiny_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p350_tiny_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p348_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p348_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p340_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p340_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p340_tiny_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p340_tiny_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p330_workstation_2nd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p330_workstation_2nd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p330_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p330_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p320_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p320_workstation:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
RHSA-2006:0298 | Red Hat Security Advisory: openssh security update | security flaw local to local copy uses shell expansion twice | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
CVE-2022-49088 | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe | In the Linux kernel, the following vulnerability has been resolved:
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
This node pointer is returned by of_find_compatible_node() with
refcount incremented. Calling of_node_put() to aovid the refcount leak. | [] | null | null | null | null |
CVE-2023-20259 | A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device.
This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention. | [
"cpe:2.3:a:cisco:emergency_responder:14su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_collaboration_deployment:14su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su7:*:*:*:session_management:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:14su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:14su3:*:*:*:session_management:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:12.5\\(1\\)su7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:14su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:14su3:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
|
CVE-2000-0641 | Savant web server allows remote attackers to execute arbitrary commands via a long GET request. | [
"cpe:2.3:a:michael_lamont:savant_webserver:2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-96jh-8f37-hfp8 | The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076. | [] | null | null | 3.8 | null |
|
GHSA-gxwp-4448-26fp | The Countdown Timer for Elementor WordPress plugin before 1.3.7 does not sanitise and escape some parameters when outputting them on the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks. | [] | null | 5.9 | null | null |
|
CVE-2022-28740 | aEnrich eHRD Learning Management Key Performance Indicator System 5+ exposes Sensitive Information to an Unauthorized Actor. | [
"cpe:2.3:a:aenrich:a\\+hrd:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-49380 | Plenti arbitrary file write vulnerability | Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability. | [
"cpe:2.3:a:plenti:plentico:*:*:*:*:*:*:*:*"
] | 8.9 | null | null | null |
CVE-2018-10514 | A Missing Impersonation Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability. | [
"cpe:2.3:a:trendmicro:antivirus_\\+_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:maximum_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:premium_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2023-24675 | Cross Site Scripting Vulnerability in BluditCMS v.3.14.1 allows attackers to execute arbitrary code via the Categories Friendly URL. | [
"cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2020-14348 | It was found in AMQ Online before 1.5.2 that injecting an invalid field to a user's AddressSpace configuration of the user namespace puts AMQ Online in an inconsistent state, where the AMQ Online components do not operate properly, such as the failure of provisioning and the failure of creating addresses, though this does not impact upon already existing messaging clients or brokers. | [
"cpe:2.3:a:redhat:amq_online:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2021-45608 | Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by an integer overflow by an unauthenticated attacker. Remote code execution from the WAN interface (TCP port 20005) cannot be ruled out; however, exploitability was judged to be of "rather significant complexity" but not "impossible." The overflow is in SoftwareBus_dispatchNormalEPMsgOut in the KCodes NetUSB kernel module. Affected NETGEAR devices are D7800 before 1.0.1.68, R6400v2 before 1.0.4.122, and R6700v3 before 1.0.4.122. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-965r-6397-r62h | Multiple SQL injection vulnerabilities in functions/display_page.func.php in cpCommerce 1.1.0 allow remote attackers to execute arbitrary SQL commands via the (1) id_product, (2) id_manufacturer, and (3) id_category parameters to unspecified components. NOTE: this probably overlaps CVE-2007-2959 and CVE-2007-2890. | [] | null | null | null | null |
|
CVE-2025-1813 | zj1983 zz cross-site request forgery | A vulnerability classified as problematic was found in zj1983 zz up to 2024-08. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 4.3 | 4.3 | 5 |
GHSA-65xv-8wgg-qhxg | Improper Restriction of Excessive Authentication Attempts vulnerability in Forge12 Interactive GmbH Captcha/Honeypot for Contact Form 7 allows Functionality Bypass.This issue affects Captcha/Honeypot for Contact Form 7: from n/a through 1.11.3. | [] | null | 5.3 | null | null |
|
GHSA-8442-g6hc-g9m7 | The web interface in VideoLAN VLC media player before 2.0.7 has no access control which allows remote attackers to view directory listings via the 'dir' command or issue other commands without authenticating. | [] | null | null | null | null |
|
GHSA-hgwj-h89r-w966 | RIOT-OS 2021.01 before commit bc59d60be60dfc0a05def57d74985371e4f22d79 contains a buffer overflow which could allow attackers to obtain sensitive information. | [] | null | null | null | null |
|
CVE-2019-15084 | Realtek Waves MaxxAudio driver 1.6.2.0, as used on Dell laptops, installs with incorrect file permissions. As a result, a local attacker can escalate to SYSTEM. | [
"cpe:2.3:a:maxx:waves_maxx_audio:1.6.2.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2018-0311 | A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packets when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could cause process crashes and result in a DoS condition on the device. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd69960, CSCve02463, CSCve04859, CSCve41530, CSCve41537, CSCve41541, CSCve41557. | [
"cpe:2.3:o:cisco:nx-os:7.0\\(0\\)hsk\\(0.357\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0.2\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.8\\(0.1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.8\\(3.5\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_c36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2148t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2224tp_ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232pp_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232tm-e_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232tm_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248pq_10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248tp-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248tp_ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6120xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6140xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2017-3462 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 |
|
CVE-2020-25872 | A vulnerability exists within the FileManagerController.php function in FrogCMS 0.9.5 which allows an attacker to perform a directory traversal attack via a GET request urlencode parameter. | [
"cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
CVE-2018-5375 | Discuz! DiscuzX X3.4 has XSS via the include\spacecp\spacecp_space.php appid parameter in a delete action. | [
"cpe:2.3:a:discuz:discuzx:x3.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
RHSA-2023:4888 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
CVE-2021-1881 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing a maliciously crafted font file may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-jj28-4744-gvh3 | named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c. | [] | null | null | 8.6 | null |
|
CVE-2024-8356 | Visteon Infotainment VIP MCU Code Insufficient Validation of Data Authenticity Local Privilege Escalation Vulnerability | Visteon Infotainment VIP MCU Code Insufficient Validation of Data Authenticity Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Visteon Infotainment systems. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the firmware update process of the VIP microcontroller. The process does not properly verify authenticity of the supplied firmware image before programming it into internal memory. An attacker can leverage this vulnerability to escalate privileges execute arbitrary code in the context of the VIP MCU. Was ZDI-CAN-23758. | [
"cpe:2.3:a:visteon:infotainment:cmu150_na_74.00.324a:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-6h35-p6rw-ff33 | The log viewer in McAfee Agent (MA) before 4.8.0 Patch 3 and 5.0.0, when the "Accept connections only from the ePO server" option is disabled, allows remote attackers to conduct clickjacking attacks via a crafted web page, aka an "http-generic-click-jacking" vulnerability. | [] | null | null | null | null |
|
GHSA-637x-5jgj-26w6 | Multiple cross-site scripting (XSS) vulnerabilities in Zenas PaoBacheca Guestbook 2.1 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) scrivi.php and (2) index.php. | [] | null | null | null | null |
|
GHSA-pcwj-hp7w-9ppv | IBM Security Guardium 10.5 could allow a remote attacker to upload arbitrary files, which could allow the attacker to execute arbitrary code on the vulnerable web server. IBM X-Force ID: 160698. | [] | null | 8.8 | null | null |
|
CVE-2022-36015 | Integer overflow in math ops in TensorFlow | TensorFlow is an open source platform for machine learning. When `RangeSize` receives values that do not fit into an `int64_t`, it crashes. We have patched the issue in GitHub commit 37e64539cd29fcfb814c4451152a60f5d107b0f0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2020-5419 | RabbitMQ arbitrary code execution using local binary planting | RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code. | [
"cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*"
] | null | null | 6.7 | null |
CVE-2008-2791 | SQL injection vulnerability in product.detail.php in Kalptaru Infotech Comparison Engine Power Script 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:kalptaru_infotech:comparison_engine_power_script:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-wg78-jv32-8pfj | SQL injection vulnerability in netinvoice.php in the nBill (com_netinvoice) component 1.2.0 SP1 for Joomla! allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving "knowledge of ... the contents of an encrypted file." | [] | null | null | null | null |
|
CVE-2023-33569 | Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via ip/eval/ajax.php?action=update_user. | [
"cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-wqpc-7xwr-93hx | Lexmark printers with firmware ATL before ATL.021.063, CB before CB.021.063, PP before PP.021.063, and YK before YK.021.063 mishandle Erase Printer Memory and Erase Hard Disk actions, which allows physically proximate attackers to obtain sensitive information via direct read operations on non-volatile memory. | [] | null | null | 4.6 | null |
|
CVE-2011-0061 | Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-9079 | code-projects Student Record System marks.php sql injection | A vulnerability was found in code-projects Student Record System 1.0 and classified as critical. This issue affects some unknown processing of the file /marks.php. The manipulation of the argument coursename leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2019-2145 | In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112858430 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2020-10413 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/import-html.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-pgwv-6cjg-6qr4 | Cross-site request forgery (CSRF) vulnerability in 'MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership' versions prior to 1.9.6 allows a remote unauthenticated attacker to hijack the authentication of an administrator and perform unintended operation via unspecified vectors. | [] | null | 8.8 | null | null |
|
CVE-2017-15653 | Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing administrator session token by using a specific User-Agent string. | [
"cpe:2.3:a:asus:asuswrt:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-rh3j-rp9c-67cx | Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. An attacker who is in the same subnetwork of the camera or has remote administrator access can fully compromise the device by performing a firmware recovery using a custom image. | [] | null | null | 8.8 | null |
|
RHSA-2024:3089 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer-plugins-good: integer overflow leading to heap overwrite in FLAC image tag handling | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
CVE-2025-27867 | Apache Felix HTTP Webconsole Plugin: XSS in HTTP Webconsole Plugin | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix HTTP Webconsole Plugin.
This issue affects Apache Felix HTTP Webconsole Plugin: from Version 1.X through 1.2.0.
Users are recommended to upgrade to version 1.2.2, which fixes the issue. | [] | null | 5.6 | null | null |
CVE-2023-5855 | Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2020-0195 | In ihevcd_iquant_itrans_recon_ctb of ihevcd_iquant_itrans_recon_ctb.c and related functions, there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-144686961 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-w6gp-q76m-wjxm | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
CVE-2008-6431 | Multiple cross-site scripting (XSS) vulnerabilities in BMForum 5.6 allow remote attackers to inject arbitrary web script or HTML via the (1) outpused parameter to index.php, the (2) footer_copyright and (3) verandproname parameters to newtem/footer/bsd01footer.php, and the (4) topads and (5) myplugin parameters to newtem/header/bsd01header.php. | [
"cpe:2.3:a:bmforum:bmforum:5.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2011:1380 | Red Hat Security Advisory: java-1.6.0-openjdk security update | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: Hotspot unspecified issue (Hotspot, 7070134) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
GHSA-xpm6-p7cj-w8w9 | Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 11.5.10.2 and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Messaging. | [] | null | null | null | null |
|
RHSA-2023:3373 | Red Hat Security Advisory: Migration Toolkit for Runtimes security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
GHSA-vrv5-28j8-rv7x | Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0. | [] | null | null | null | null |
|
GHSA-xcfc-r834-76g4 | In the Linux kernel, the following vulnerability has been resolved:scsi: qedf: Add pointer checks in qedf_update_link_speed()The following trace was observed:[ 14.042059] Call Trace:
[ 14.042061] <IRQ>
[ 14.042068] qedf_link_update+0x144/0x1f0 [qedf]
[ 14.042117] qed_link_update+0x5c/0x80 [qed]
[ 14.042135] qed_mcp_handle_link_change+0x2d2/0x410 [qed]
[ 14.042155] ? qed_set_ptt+0x70/0x80 [qed]
[ 14.042170] ? qed_set_ptt+0x70/0x80 [qed]
[ 14.042186] ? qed_rd+0x13/0x40 [qed]
[ 14.042205] qed_mcp_handle_events+0x437/0x690 [qed]
[ 14.042221] ? qed_set_ptt+0x70/0x80 [qed]
[ 14.042239] qed_int_sp_dpc+0x3a6/0x3e0 [qed]
[ 14.042245] tasklet_action_common.isra.14+0x5a/0x100
[ 14.042250] __do_softirq+0xe4/0x2f8
[ 14.042253] irq_exit+0xf7/0x100
[ 14.042255] do_IRQ+0x7f/0xd0
[ 14.042257] common_interrupt+0xf/0xf
[ 14.042259] </IRQ>API qedf_link_update() is getting called from QED but by that time
shost_data is not initialised. This results in a NULL pointer dereference
when we try to dereference shost_data while updating supported_speeds.Add a NULL pointer check before dereferencing shost_data. | [] | null | 5.5 | null | null |
|
GHSA-8m6g-gw2g-4vv5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Forms allows Stored XSS. This issue affects Piotnet Forms: from n/a through 1.0.30. | [] | null | 5.9 | null | null |
|
GHSA-8p37-98j5-xm75 | EMC Isilon OneFS 8.0.0.0, EMC Isilon OneFS 7.2.1.0 - 7.2.1.2, EMC Isilon OneFS 7.2.0.x, EMC Isilon OneFS 7.1.1.0 - 7.1.1.10, and EMC Isilon OneFS 7.1.0.x is affected by an LDAP injection vulnerability that could potentially be exploited by a malicious user to compromise the system. | [] | null | null | 6.7 | null |
Subsets and Splits