id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-fxhp-wrw9-3r97 | XML external entity (XXE) injection in Apache Nutch | An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Nutch 1.18. | [] | null | 9.1 | null | null |
GHSA-f89x-f84f-9jfp | IBM Engineering Test Management 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210671. | [] | null | 5.4 | null | null |
|
GHSA-fc79-j7vw-6xjg | The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids. | [] | null | null | 7.5 | null |
|
GHSA-67jg-mxq3-434p | The affected product is vulnerable to an information leak, which may allow an attacker to obtain sensitive information on the Ignition 8 (all versions prior to 8.0.13). | [] | null | null | null | null |
|
CVE-2011-1103 | The WebReporting module in F-Secure Policy Manager 7.x, 8.00 before hotfix 2, 8.1x before hotfix 3 on Windows and hotfix 2 on Linux, and 9.00 before hotfix 4 on Windows and hotfix 2 on Linux, allows remote attackers to obtain sensitive information via a request to an invalid report, which reveals the installation path in an error message, as demonstrated with requests to (1) report/infection-table.html or (2) report/productsummary-table.html. | [
"cpe:2.3:a:f-secure:policy_manager:7.00:*:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:8.00:hotfix1:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:8.1x:hotfix1:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:8.1x:hotfix2:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:9.00:hotfix1:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:9.00:hotfix2:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:9.00:hotfix3:windows:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:8.00:hotfix1:linux:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:8.1x:hotfix1:linux:*:*:*:*:*",
"cpe:2.3:a:f-secure:policy_manager:9.00:hotfix1:linux:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-4015 | PHP Web Statistik 1.4 does not rotate the log database or limit the size of the referer field, which allows remote attackers to fill the log files via a large number of requests, as demonstrated using pixel.php. | [
"cpe:2.3:a:php_web:statistik:1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-0440 | Catch Themes Demo Import < 2.1.1 - Admin+ Remote Code Execution | The Catch Themes Demo Import WordPress plugin before 2.1.1 does not validate one of the file to be imported, which could allow high privivilege admin to upload an arbitrary PHP file and gain RCE even in the case of an hardened blog (ie DISALLOW_UNFILTERED_HTML, DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS constants set to true) | [
"cpe:2.3:a:catchplugins:catch_themes_demo_import:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 |
CVE-2024-43325 | WordPress Dark Mode for WP Dashboard plugin <= 1.2.3 - Cross Site Request Forgery vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Naiche Dark Mode for WP Dashboard.This issue affects Dark Mode for WP Dashboard: from n/a through 1.2.3. | [
"cpe:2.3:a:naiches:dark_mode_for_wp_dashboard:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2022-21142 | Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition. | [
"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 |
|
CVE-2024-29971 | Scontain SCONE 5.8.0 has an interface vulnerability that leads to state corruption via injected signals. | [] | null | 9.8 | null | null |
|
GHSA-3w9p-phq7-3r7c | ** DISPUTED ** An issue was discovered in SMA Solar Technology products. An attacker can use Sunny Explorer or the SMAdata2+ network protocol to update the device firmware without ever having to authenticate. If an attacker is able to create a custom firmware version that is accepted by the inverter, the inverter is compromised completely. This allows the attacker to do nearly anything: for example, giving access to the local OS, creating a botnet, using the inverters as a stepping stone into companies, etc. NOTE: the vendor reports that this attack has always been blocked by "a final integrity and compatibility check." Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected. | [] | null | null | 9.8 | null |
|
CVE-2023-26338 | ZDI-CAN-19410: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2007-5237 | Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities." | [
"cpe:2.3:a:sun:jdk:*:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update2:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-4hp8-c3wm-fwh9 | Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9. | [] | null | 5.4 | null | null |
|
CVE-2014-9382 | Freebox OS Web interface 3.0.2 has CSRF which can allow VPN user account creation | [
"cpe:2.3:a:free:freebox_os:3.0.2:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2015-2471 | Microsoft XML Core Services 3.0, 5.0, and 6.0 supports SSL 2.0, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and conducting a decryption attack, aka "MSXML Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2434. | [
"cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-92r8-w862-f2pj | ** UNSUPPORTED WHEN ASSIGNED ** A heap-based buffer overflow exists in XML Decompression DecodeTreeBlock in AT&T Labs Xmill 0.7. A crafted input file can lead to remote code execution. This is not the same as any of: CVE-2021-21810, CVE-2021-21811, CVE-2021-21812, CVE-2021-21815, CVE-2021-21825, CVE-2021-21826, CVE-2021-21828, CVE-2021-21829, or CVE-2021-21830. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] | null | 9.8 | null | null |
|
GHSA-wc5r-jmxq-6gr5 | Buffer overflow in gPS before 0.10.2 may allow local users to cause a denial of service (SIGSEGV) in rgpsp via long command lines. | [] | null | null | null | null |
|
GHSA-vwfh-hrm2-8q9h | Browse restriction bypass vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to obtain the data of Scheduler. | [] | null | 4.3 | null | null |
|
GHSA-ph8x-5vv5-hcvf | CFNetwork in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 misparses the Set-Cookie header, which allows remote attackers to obtain sensitive information via a crafted HTTP response. | [] | null | null | 6.5 | null |
|
CVE-2025-24113 | The issue was addressed with improved UI. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. Visiting a malicious website may lead to user interface spoofing. | [] | null | 4.3 | null | null |
|
GHSA-wrvx-mjj7-5qf8 | A vulnerability was found in Xinhu RockOA 2.6.3 and classified as problematic. Affected by this issue is the function okla of the file /webmain/public/upload/tpl_upload.html. The manipulation of the argument callback leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271994 is the identifier assigned to this vulnerability. | [] | 5.3 | 3.5 | null | null |
|
GHSA-79h6-9x4m-hjv8 | Acoustica MP3 Audio Mixer 1.0 and possibly 2.471 allows remote attackers to cause a denial of service (crash) via a long string in a .sgp playlist file. | [] | null | null | null | null |
|
CVE-2016-1994 | HPE System Management Homepage before 7.5.4 allows remote authenticated users to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-vf9w-8jq5-g3f2 | Cleartext Storage of Sensitive Information in SICK FTMg AIR FLOW SENSOR with
Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote
attacker to potentially steal user credentials that are stored in the user’s browsers local storage via
cross-site-scripting attacks. | [] | null | 5.3 | null | null |
|
CVE-2024-28730 | Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the file upload feature of the VPN configuration module. | [
"cpe:2.3:o:d-link:dwr-2000m_firmware:1.34me:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dwr-2000m_firmware:1.34me:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-2000m:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
ICSA-22-006-03 | IDEC PLCs | An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.CVE-2021-37400 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.CVE-2021-37401 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). An attacker may obtain the PLC web server user credentials from the communication between the PLC and the software. As a result, the complete access privileges to the PLC web server may be obtained, and manipulation of the PLC output and/or suspension of the PLC may be conducted.CVE-2021-20826 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). An attacker may obtain the PLC web server user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the attacker may access the PLC web server and hijack the PLC, and manipulation of the PLC output and/or suspension of the PLC may be conducted.CVE-2021-20827 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). | [] | null | null | 7.6 | null |
CVE-2012-2415 | Heap-based buffer overflow in chan_skinny.c in the Skinny channel driver in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 allows remote authenticated users to cause a denial of service or possibly have unspecified other impact via a series of KEYPAD_BUTTON_MESSAGE events. | [
"cpe:2.3:a:asterisk:open_source:1.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.11:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2023-47320 | Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below. | [
"cpe:2.3:a:silverpeas:silverpeas:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
GHSA-vf77-8h7g-gghp | Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat | An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. | [] | null | 7.5 | null | null |
GHSA-xg5q-78jw-568v | Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | null | null |
|
GHSA-2x7c-xp8r-3chr | RSA Authentication Manager versions prior to 8.4 P10 contain a stored cross-site scripting vulnerability in the Security Console. A malicious RSA Authentication Manager Security Console administrator with advanced privileges could exploit this vulnerability to store arbitrary HTML or JavaScript code through the Security Console web interface. When other Security Console administrators attempt to change the default security domain mapping, the injected scripts could potentially be executed in their browser. | [] | null | 4.8 | null | null |
|
CVE-2023-6655 | Hongjing e-HR Login Interface loadhistroyorgtree sql injection | A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:hrp2000:e-hr:2020:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
GHSA-8qxh-5rrf-mrg7 | The Enterprise Console client in IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-wvgq-5h76-hrgf | The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'text' and 'id' parameters of the limpia() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress. | [] | null | 7.5 | null | null |
|
CVE-2024-34380 | WordPress ChatBot Conversational Forms plugin <= 1.2.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuantumCloud Conversational Forms for ChatBot allows Stored XSS.This issue affects Conversational Forms for ChatBot: from n/a through 1.2.0.
| [] | null | 5.9 | null | null |
CVE-2013-0508 | Multiple buffer overflows in IBM Tivoli Netcool System Service Monitors (SSM) and Application Service Monitors (ASM) 4.0.0 before FP14 and 4.0.1 before FP1 allow context-dependent attackers to execute arbitrary code or cause a denial of service via a long line in (1) hrfstable.idx, (2) hrdevice.idx, (3) hrstorage.idx, or (4) lotusmapfile in the SSM Config directory, or (5) .manifest.hive in the main agent directory. | [
"cpe:2.3:a:ibm:tivoli_netcool_application_service_monitors:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_netcool_application_service_monitors:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_netcool_system_service_monitors:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_netcool_system_service_monitors:4.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
CVE-2008-4814 | Unspecified vulnerability in a JavaScript method in Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allows remote attackers to execute arbitrary code via unknown vectors, related to an "input validation issue." | [
"cpe:2.3:a:adobe:acrobat:*:unknown:3d:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:unknown:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:unknown:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:unknown:3d:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:unknown:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:unknown:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2006-2252 | Cross-site scripting vulnerability in submit.php in OpenFAQ 0.4.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter. | [
"cpe:2.3:a:openfaq:openfaq:0.4.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-94q4-rgw4-95gr | The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. | [] | null | null | null | null |
|
GHSA-2x5p-mrxx-5gvq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tzin111 Web2application allows Reflected XSS. This issue affects Web2application: from n/a through 5.6. | [] | null | 7.1 | null | null |
|
GHSA-52fg-wjxm-pp44 | Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an admin attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link. Confidentiality and integrity impact is high as it affects other admin accounts. | [] | null | 8.1 | null | null |
|
CVE-2019-11450 | whatsns 4.0 allows index.php?question/ajaxadd.html title SQL injection. | [
"cpe:2.3:a:whatsns:whatsns:4.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2023-1750 | CVE-2023-1750 | The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information. | [
"cpe:2.3:o:getnexx:nxal-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxal-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:getnexx:nxg-100b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxg-100b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:getnexx:nxpg-100w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxpg-100w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:getnexx:nxg-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxg-200:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2023-42669 | Samba: "rpcecho" development server allows denial of service via sleep() call on ad dc | A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task. | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.2::baseos",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/a:redhat:storage:3",
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2014-8534 | Unspecified vulnerability in the login form in McAfee Network Data Loss Prevention (NDLP) before 9.2.2 allows local users to cause a denial of service via a crafted value in the domain field. | [
"cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:network_data_loss_prevention:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-c4f9-xqxp-hcrv | Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.1 and X8.5.2 allows local users to write to arbitrary files via an unspecified symlink attack, aka Bug ID CSCuv11969. | [] | null | null | null | null |
|
CVE-2006-6521 | SQL injection vulnerability in lire-avis.php in Messageriescripthp 2.0 allows remote attackers to execute arbitrary SQL commands via the aa parameter. | [
"cpe:2.3:a:scriptphp:messageriescripthp:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-1319 | Buffer overflow in ImageIO in Apple OS X 10.9.x through 10.9.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image. | [
"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-wm3g-qx6c-fjf6 | A Stored Cross-Site Scripting (XSS) vulnerability exists in OpenKM version 7.1.40 (dbb6e88) With Professional Extension that allows an authenticated user to upload a note on a file which acts as a stored XSS payload. Any user who opens the note of a document file will trigger the XSS. | [] | null | 5.4 | null | null |
|
CVE-2013-5880 | Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 12.2.0, 12.2.1, and 12.2.2 allows remote attackers to affect confidentiality via unknown vectors related to DM Others. | [
"cpe:2.3:a:oracle:supply_chain_products_suite:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:12.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:12.2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vpgh-3hx2-v733 | Cross-site scripting (XSS) vulnerability in the Suggested Terms module 5.x before 5.x-1.2 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via crafted Taxonomy terms. | [] | null | null | null | null |
|
GHSA-x69f-qgv5-6pgg | In the Linux kernel, the following vulnerability has been resolved:block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()Our syzkaller report a following UAF for v6.6:BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958
Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0-g3629d1885222 #39
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
print_address_description.constprop.0+0x66/0x300 mm/kasan/report.c:364
print_report+0x3e/0x70 mm/kasan/report.c:475
kasan_report+0xb8/0xf0 mm/kasan/report.c:588
hlist_add_head include/linux/list.h:1023 [inline]
bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958
bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271
bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323
blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660
blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143
__submit_bio+0xa0/0x6b0 block/blk-core.c:639
__submit_bio_noacct_mq block/blk-core.c:718 [inline]
submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747
submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847
__ext4_read_bh fs/ext4/super.c:205 [inline]
ext4_read_bh+0x15e/0x2e0 fs/ext4/super.c:230
__read_extent_tree_block+0x304/0x6f0 fs/ext4/extents.c:567
ext4_find_extent+0x479/0xd20 fs/ext4/extents.c:947
ext4_ext_map_blocks+0x1a3/0x2680 fs/ext4/extents.c:4182
ext4_map_blocks+0x929/0x15a0 fs/ext4/inode.c:660
ext4_iomap_begin_report+0x298/0x480 fs/ext4/inode.c:3569
iomap_iter+0x3dd/0x1010 fs/iomap/iter.c:91
iomap_fiemap+0x1f4/0x360 fs/iomap/fiemap.c:80
ext4_fiemap+0x181/0x210 fs/ext4/extents.c:5051
ioctl_fiemap.isra.0+0x1b4/0x290 fs/ioctl.c:220
do_vfs_ioctl+0x31c/0x11a0 fs/ioctl.c:811
__do_sys_ioctl fs/ioctl.c:869 [inline]
__se_sys_ioctl+0xae/0x190 fs/ioctl.c:857
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x70/0x120 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x78/0xe2Allocated by task 232719:
kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
__kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328
kasan_slab_alloc include/linux/kasan.h:188 [inline]
slab_post_alloc_hook mm/slab.h:768 [inline]
slab_alloc_node mm/slub.c:3492 [inline]
kmem_cache_alloc_node+0x1b8/0x6f0 mm/slub.c:3537
bfq_get_queue+0x215/0x1f00 block/bfq-iosched.c:5869
bfq_get_bfqq_handle_split+0x167/0x5f0 block/bfq-iosched.c:6776
bfq_init_rq+0x13a4/0x17a0 block/bfq-iosched.c:6938
bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271
bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323
blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660
blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143
__submit_bio+0xa0/0x6b0 block/blk-core.c:639
__submit_bio_noacct_mq block/blk-core.c:718 [inline]
submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747
submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847
__ext4_read_bh fs/ext4/super.c:205 [inline]
ext4_read_bh_nowait+0x15a/0x240 fs/ext4/super.c:217
ext4_read_bh_lock+0xac/0xd0 fs/ext4/super.c:242
ext4_bread_batch+0x268/0x500 fs/ext4/inode.c:958
__ext4_find_entry+0x448/0x10f0 fs/ext4/namei.c:1671
ext4_lookup_entry fs/ext4/namei.c:1774 [inline]
ext4_lookup.part.0+0x359/0x6f0 fs/ext4/namei.c:1842
ext4_lookup+0x72/0x90 fs/ext4/namei.c:1839
__lookup_slow+0x257/0x480 fs/namei.c:1696
lookup_slow fs/namei.c:1713 [inline]
walk_component+0x454/0x5c0 fs/namei.c:2004
link_path_walk.part.0+0x773/0xda0 fs/namei.c:2331
link_path_walk fs/namei.c:3826 [inline]
path_openat+0x1b9/0x520 fs/namei.c:3826
do_filp_open+0x1b7/0x400 fs/namei.c:3857
do_sys_openat2+0x5dc/0x6e0 fs/open.c:1428
do_sys_open fs/open.c:1443 [inline]
__do_sys_openat fs/open.c:1459 [inline]
__se_sys_openat fs/open.c:1454 [inline]
__x64_sys_openat+0x148/0x200 fs/open.c:1454
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_6
---truncated--- | [] | null | 7.8 | null | null |
|
GHSA-vh4q-xf3f-7h4p | The WP Ajax Contact Form WordPress plugin through 2.2.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin users | [] | null | 6.1 | null | null |
|
CVE-2016-0812 | The interceptKeyBeforeDispatching function in policy/src/com/android/internal/policy/impl/PhoneWindowManager.java in Setup Wizard in Android 5.1.x before 5.1.1 LMY49G and 6.0 before 2016-02-01 does not properly check for setup completion, which allows physically proximate attackers to bypass the Factory Reset Protection protection mechanism and delete data via unspecified vectors, aka internal bug 25229538. | [
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 6.6 |
|
CVE-2023-36776 | Win32k Elevation of Privilege Vulnerability | Win32k Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
GHSA-prc2-gwpw-8w6f | IBM Security Privileged Identity Manager could allow a remote attacker to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information. | [] | null | null | 7.5 | null |
|
GHSA-v4w7-98vm-rrmr | A vulnerability in certain commands of Cisco Elastic Services Controller could allow an authenticated, remote attacker to elevate privileges to root and run dangerous commands on the server. The vulnerability occurs because a "tomcat" user on the system can run certain shell commands, allowing the user to overwrite any file on the filesystem and elevate privileges to root. This vulnerability affects Cisco Elastic Services Controller prior to releases 2.3.1.434 and 2.3.2. Cisco Bug IDs: CSCvc76634. | [] | null | null | 8.8 | null |
|
CVE-2023-20873 | In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+. | [
"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2023-38751 | Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the organization information of the information receiver that is set as "non-disclosure" in the information provision operation. | [
"cpe:2.3:a:jpcert:special_interest_group_network_for_analysis_and_liaison:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-6629-529f-2h95 | A vulnerability was found in slackero phpwcms up to 1.9.26. It has been classified as problematic. This affects an unknown part of the component SVG File Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.9.27 is able to address this issue. The name of the patch is b39db9c7ad3800f319195ff0e26a0981395b1c54. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217419. | [] | null | 6.1 | null | null |
|
RHSA-2023:0855 | Red Hat Security Advisory: pcs security update | sinatra: Reflected File Download attack | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 8.8 | null | null |
CVE-2006-4824 | PHP remote file inclusion vulnerability in lib/activeutil.php in Quicksilver Forums (QSF) 1.2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the set[include_path] parameter. | [
"cpe:2.3:a:quicksilver_forums:quicksilver_forums:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-46801 | WordPress Site Reviews Plugin <= 6.2.0 is vulnerable to CSV Injection | Improper Neutralization of Formula Elements in a CSV File vulnerability in Paul Ryley Site Reviews.This issue affects Site Reviews: from n/a through 6.2.0.
| [
"cpe:2.3:a:geminilabs:site_reviews:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
CVE-2014-8133 | arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.69:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.70:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.71:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.72:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.73:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.74:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.75:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.76:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.77:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.78:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.79:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:arm64:*",
"cpe:2.3:o:linux:linux_kernel:3.17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.18:rc1:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-q5qx-cvhv-qfq2 | The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. The new ENIP connections cannot be established if impacted by this vulnerability, which prohibits operational capabilities of the device resulting in a denial-of-service attack. | [] | null | 7.5 | null | null |
|
CVE-2016-7047 | A flaw was found in the CloudForms API before 5.6.3.0, 5.7.3.1 and 5.8.1.2. A user with permissions to use the MiqReportResults capability within the API could potentially view data from other tenants or groups to which they should not have access. | [
"cpe:2.3:a:redhat:cloudforms:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_management_engine:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2017-13172 | An elevation of privilege vulnerability in the MediaTek bluetooth driver. Product: Android. Versions: Android kernel. Android ID A-36493287. References: M-ALPS03495791. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-67vf-6vph-7w9w | Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] | null | 8.8 | null | null |
|
CVE-2018-4182 | In macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions on CUPS. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 8.2 | 7.2 |
|
GHSA-gjr3-77hh-vh3q | IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a user to perform unauthorized activities due to improper encoding of output. IBM X-Force ID: 196183. | [] | null | null | null | null |
|
CVE-2014-7093 | The Superbike Magazine (aka com.triactivemedia.superbike) application @7F08017A for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:pocketmags:superbike_magazine:\\@7f08017a:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2021-24258 | ElementsKit and ElementsKit Pro < 2.2.0 - Contributor+ Stored XSS | The Elements Kit Lite and Elements Kit Pro WordPress Plugins before 2.2.0 have a number of widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. | [
"cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 4 |
GHSA-r3hv-m3j5-mrfp | An issue was discovered in Zulip Server before 3.4. A bug in the implementation of the all_public_streams API feature resulted in guest users being able to receive message traffic to public streams that should have been only accessible to members of the organization. | [] | null | 5.3 | null | null |
|
GHSA-3qvm-hgh7-6462 | The affected product lacks proper validation of user-supplied data, which can result in deserialization of untrusted data on the Ignition 8 Gateway (versions prior to 8.0.10), allowing an attacker to obtain sensitive information. | [] | null | null | null | null |
|
GHSA-mx6q-c5pf-x697 | Buffer overflow in Savant Web Server 3.1 allows remote attackers to execute arbitrary code via a long HTTP request. | [] | null | null | null | null |
|
CVE-2008-1436 | Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping. | [
"cpe:2.3:o:microsoft:windows-nt:vista:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows-nt:vista:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows-nt:vista:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"
] | null | null | null | 9 |
|
cisco-sa-20190306-nx-os-bash-escal | Cisco NX-OS Software Bash Shell Role-Based Access Control Bypass Privilege Escalation Vulnerability | A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level by executing commands authorized to other user roles. The attacker must authenticate with valid user credentials.
The vulnerability is due to the incorrect implementation of a Bash shell command that allows role-based access control (RBAC) to be bypassed. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the Bash prompt. A successful exploit could allow the attacker to escalate their privilege level by executing commands that should be restricted to other roles. For example, a dev-ops user could escalate their privilege level to admin with a successful exploit of this vulnerability.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-bash-escal ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-bash-escal"]
This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-70757"]. | [] | null | null | 7.8 | null |
CVE-2016-4876 | Cross-site request forgery (CSRF) vulnerability in baserCMS version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators to execute arbitrary PHP code via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:3.0.10:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-4g3q-mj64-82x3 | In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. Attacker can use "update password" function to inject XSS payloads into nickname variable, and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS. | [] | null | null | null | null |
|
GHSA-52vv-3vf7-f7wh | Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX | A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file. | [] | null | 9.1 | null | null |
CVE-2011-2796 | Use-after-free vulnerability in Skia, as used in Google Chrome before 13.0.782.107, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-49507 | InDesign Desktop | Heap-based Buffer Overflow (CWE-122) | InDesign Desktop versions ID18.5.2, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2018-14975 | An issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/album.php has XSS. | [
"cpe:2.3:a:q-cms:qcms:3.0.1:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2025-27469 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. | [] | null | 7.5 | null | null |
CVE-2018-9949 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIFF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5473. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2021-44161 | Changing Information Technology Inc. MOTP(Mobile One Time Password) - SQL Injection | Changing MOTP (Mobile One Time Password) system’s specific function parameter has insufficient validation for user input. A attacker in local area network can perform SQL injection attack to read, modify or delete backend database without authentication. | [
"cpe:2.3:a:changingtec:motp:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-ggx2-877f-x836 | Microsoft PowerPoint 2007 SP2; Office 2008 for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and PowerPoint Viewer 2007 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an invalid OfficeArt record in a PowerPoint document, aka "OfficeArt Shape RCE Vulnerability." | [] | null | null | null | null |
|
GHSA-8c36-rqcc-rv4q | xArrow SCADA versions 7.2 and prior is vulnerable to cross-site scripting due to parameter ‘edate’ of the resource xhisalarm.htm, which may allow an unauthorized attacker to execute arbitrary code. | [] | null | 6.1 | null | null |
|
GHSA-wfjp-wqgq-35g7 | Android intent URLs given to Firefox for Android can be used to navigate from HTTP or HTTPS URLs to local "file:" URLs, allowing for the reading of local data through a violation of same-origin policy. Note: This attack only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 54. | [] | null | null | 7.5 | null |
|
GHSA-22g8-9ph6-qpq3 | Lyris ListManager 8.95 allows remote authenticated users, who have administrative privileges for at least one list on the server, to add new administrators to any list via a modified MEMBERS_.List_ parameter. | [] | null | null | null | null |
|
GHSA-w643-wvhg-95x9 | This issue was addressed with improved checks. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5. Entitlements and privacy permissions granted to this app may be used by a malicious app | [] | null | 5.5 | null | null |
|
GHSA-26pm-g3r3-95jw | Multiple SQL injection vulnerabilities in DevelopItEasy Events Calendar 1.2 allow remote attackers to execute arbitrary SQL commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-3482-6g24-6chg | Cisco NX-OS allows local users to bypass intended TACACS+ command restrictions via a series of multiple commands, aka Bug ID CSCum47367. | [] | null | null | null | null |
|
CVE-2017-17282 | SCCP (Signalling Connection Control Part) module in Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 has a buffer overflow vulnerability. An attacker has to find a way to send malformed packets to the affected products repeatedly. Due to insufficient input validation, successful exploit may cause some service abnormal. | [
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*"
] | null | null | 3.1 | 2.9 |
|
GHSA-cg6m-6cwv-92p6 | Dell EMC PowerScale OneFS 8.2.x - 9.3.0.x contain an improper handling of value vulnerability. An unprivileged network attacker could potentially exploit this vulnerability, leading to denial-of-service. | [] | null | 7.5 | null | null |
|
GHSA-x6h6-66j7-3gwr | A vulnerability was found in Campcodes Church Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/addgiving.php. The manipulation of the argument amount leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259909 was assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
GHSA-8cxj-vc9j-xq64 | CX-Motion-MCH v2.32 and earlier contains an access of uninitialized pointer vulnerability. Having a user to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution. | [] | null | 7.8 | null | null |
|
CVE-2017-7857 | FreeType 2 before 2017-03-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c. | [
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-9mhc-p2p5-344j | The Import function in MintHCM RELEASE 3.0.8 allows an attacker to execute a cross-site scripting (XSS) payload in file-upload. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.