id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-6m6j-pffj-j8qc | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: IKE). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via IKE to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 7.5 | null |
|
GHSA-f64w-hg82-2rqv | Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi. | [] | null | null | null | null |
|
CVE-2020-9625 | Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:dng_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-29316 | [FG-VD-23-012] Adobe InDesign 2023 Out-of-Bound Read Vulnerability IX Notification | Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-v998-vfgc-jvvp | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | [] | null | 6.8 | null | null |
|
GHSA-vx3w-mr85-r8vr | An issue was discovered in MariaDB MaxScale before 23.02.3. A user enters an encrypted password on a "maxctrl create service" command line, but this password is then stored in cleartext in the resulting .cnf file under /var/lib/maxscale/maxscale.cnf.d. The fixed versions are 2.5.28, 6.4.9, 22.08.8, and 23.02.3. | [] | null | 6.5 | null | null |
|
GHSA-j942-3xjh-rv67 | newsscript.pl for NewsScript allows remote attackers to gain privileges by setting the mode parameter to admin. | [] | null | null | null | null |
|
CVE-2005-1229 | Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a .. (dot dot) in a cpio file. | [
"cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-82f5-xjqp-xw48 | Missing Authorization vulnerability in Ovic Team Ovic Product Bundle allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ovic Product Bundle: from n/a through 1.1.2. | [] | null | 6.5 | null | null |
|
CVE-2022-2423 | DW Promobar <= 1.0.4 - Admin+ Stored Cross-Site Scripting | The DW Promobar WordPress plugin through 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:designwall:dw_promobar:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2022-45503 | Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the linkEn parameter at /goform/setAutoPing. | [
"cpe:2.3:o:tenda:w6-s_firmware:1.0.0.4\\(510\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:w6-s:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-mcq2-w56r-5w2w | Daemon panics when processing certain blocks | Impactgo-ipfs nodes with versions 0.10.0, 0.11.0, 0.12.0, or 0.12.1 can crash when trying to traverse certain malformed graphs due to an issue in the go-codec-dagpb dependency. Vulnerable nodes that work with these malformed graphs may crash leading to denial-of-service risks.This particularly impacts nodes that download or export data that is controlled by external user input as there is the possibility that a malicious user of those services could (intentionally or unintentionally) cause the node to traverse a malformed graph. Some notable use cases include public gateways and pinning services which fetch data on behalf of users, as well as applications such as IPFS Companion which load data based on a user visiting a website with links to IPFS URLs.PatchesVersions v0.11.1 and v0.12.2 both resolve this issue. This should make it easy to upgrade, even if you have not yet performed the v0.12.0 migration.For those running on forked versions of go-ipfs or who are on v0.10.0 and are having trouble with the v0.11.0 breaking changes, simply updating the version of `go-codec-dagpb` you are using to >=v1.3.2 should resolve the issue.Any users of libraries within the go-ipfs ecosystem, even if not the go-ipfs package or binary itself, may be affected and should upgrade their dependency on go-codec-dagpb. You can check if your Go module has a dependency on `go-codec-dagpb` by running a command such as `go mod graph | grep go-codec-dagpb` in your module root.WorkaroundsThe best way to workaround this issue is to control exposure to any endpoints that allow for arbitrary IPLD traversals. This primarily includes the HTTP RPC API (https://docs.ipfs.io/reference/http/api ) and the Gateway API. If you are exposing those APIs, then do so within an environment where only trusted users and applications you control have access to it. You should be safe as long as your users and applications do not create malformed graphs, which should not happen using standard `go-ipfs` tooling.If you previously had a more open access environment, then closing off access will only be sufficient if both of the following are true:The experimental GraphSync feature is disabled (https://github.com/ipfs/go-ipfs/blob/master/docs/experimental-features.md#graphsync)The only data being accessed is non-malformed dataReferencesSee also the [go-codec-dagpb security advisory](https://github.com/ipld/go-codec-dagpb/security/advisories/GHSA-g3vv-g2j5-45f2).For more informationIf you have any questions or comments about this advisory:Ask in [IPFS Discord #ipfs-chatter](https://discord.gg/ipfs)Open an issue in [go-ipfs](https://github.com/ipld/go-ipfs) | [] | null | null | null | null |
CVE-2023-43659 | Cross-site Scripting via email preview when CSP disabled in Discourse | Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites with CSP disabled. This issue has been patched in the 3.1.1 stable release as well as the 3.2.0.beta1 release. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
| [
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*"
] | null | 8 | null | null |
cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 | Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability | A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash.
The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.
Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2"]
This advisory is part of the October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 17 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74302"]. | [] | null | null | 8.1 | null |
GHSA-jm6j-44hq-2rfv | Cross-site scripting (XSS) vulnerability in the WebRunMenuFrame page in the online meeting center template in IBM Lotus Sametime before 8.0 allows remote attackers to inject arbitrary web script or HTML via the URI. | [] | null | null | null | null |
|
GHSA-r2ff-gw5r-6x3q | A flaw was found in ovirt-engine, which leads to the logging of plaintext passwords in the log file when using otapi-style. This flaw allows an attacker with sufficient privileges to read the log file, leading to confidentiality loss. | [] | null | 6.5 | null | null |
|
CVE-2021-0305 | In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447 | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2020-10103 | An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially crafted link to the uploaded file with an active Zammad session. | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-2f5q-9jjp-h29j | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | [] | null | null | null | null |
|
CVE-2018-8226 | A denial of service vulnerability exists in the HTTP 2.0 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP 2.0 requests, aka "HTTP.sys Denial of Service Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2024-49961 | media: i2c: ar0521: Use cansleep version of gpiod_set_value() | In the Linux kernel, the following vulnerability has been resolved:
media: i2c: ar0521: Use cansleep version of gpiod_set_value()
If we use GPIO reset from I2C port expander, we must use *_cansleep()
variant of GPIO functions.
This was not done in ar0521_power_on()/ar0521_power_off() functions.
Let's fix that.
------------[ cut here ]------------
WARNING: CPU: 0 PID: 11 at drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x74/0x7c
Modules linked in:
CPU: 0 PID: 11 Comm: kworker/u16:0 Not tainted 6.10.0 #53
Hardware name: Diasom DS-RK3568-SOM-EVB (DT)
Workqueue: events_unbound deferred_probe_work_func
pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : gpiod_set_value+0x74/0x7c
lr : ar0521_power_on+0xcc/0x290
sp : ffffff8001d7ab70
x29: ffffff8001d7ab70 x28: ffffff80027dcc90 x27: ffffff8003c82000
x26: ffffff8003ca9250 x25: ffffffc080a39c60 x24: ffffff8003ca9088
x23: ffffff8002402720 x22: ffffff8003ca9080 x21: ffffff8003ca9088
x20: 0000000000000000 x19: ffffff8001eb2a00 x18: ffffff80efeeac80
x17: 756d2d6332692f30 x16: 0000000000000000 x15: 0000000000000000
x14: ffffff8001d91d40 x13: 0000000000000016 x12: ffffffc080e98930
x11: ffffff8001eb2880 x10: 0000000000000890 x9 : ffffff8001d7a9f0
x8 : ffffff8001d92570 x7 : ffffff80efeeac80 x6 : 000000003fc6e780
x5 : ffffff8001d91c80 x4 : 0000000000000002 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000001
Call trace:
gpiod_set_value+0x74/0x7c
ar0521_power_on+0xcc/0x290
... | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
RHSA-2022:0477 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | gitops: Path traversal and dereference of symlinks when passing Helm value files | [
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 7.7 | null | null |
CVE-2019-8099 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-22408 | Server-Side Request Forgery (SSRF) in Shopware Flow Builder | Shopware is an open headless commerce platform. The implemented Flow Builder functionality in the Shopware application does not adequately validate the URL used when creating the “call webhook” action. This enables malicious users to perform web requests to internal hosts. This issue has been fixed in the Commercial Plugin release 6.5.7.4 or with the Security Plugin. For installations with Shopware 6.4 the Security plugin is recommended to be installed and up to date. For older versions of 6.4 and 6.5 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
| [
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
GHSA-6mjp-x9f5-mxvr | PHP remote file inclusion vulnerability in functions/prepend_adm.php in NagiosQL 2005 2.00 allows remote attackers to execute arbitrary PHP code via a URL in the SETS[path][physical] parameter. | [] | null | null | null | null |
|
GHSA-vmh7-68x6-gw3h | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data. | [] | null | 9.8 | null | null |
|
RHSA-2025:0051 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, and kpatch-patch-4_18_0-477_81_1 security update | kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
GHSA-5phm-xfxq-9mgw | Autodesk Customer Support Portal allows cases created by users under an account to see cases created by other users on the same account. | [] | null | 4.3 | null | null |
|
CVE-2009-3245 | OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-p77r-p748-87qx | Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074. | [] | null | null | null | null |
|
GHSA-4prx-86c8-w4w7 | The mintToken function of a smart contract implementation for dopnetwork, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
GHSA-v936-j8gp-9q3p | Open redirects on some federation and push requests | ImpactRequests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible.For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary.PatchesIssue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954.WorkaroundsRequests to internal IP addresses could be blocked at the system or network level. | [] | 6.3 | 3.1 | null | null |
CVE-2021-27383 | A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4), SINAMICS GH150 (All versions), SINAMICS GL150 (with option X30) (All versions), SINAMICS GM150 (with option X30) (All versions), SINAMICS SH150 (All versions), SINAMICS SL150 (All versions), SINAMICS SM120 (All versions), SINAMICS SM150 (All versions), SINAMICS SM150i (All versions). SmartVNC has a heap allocation leak vulnerability in the server Tight encoder, which could result in a Denial-of-Service condition. | [
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_sh150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_sh150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_sm150i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_sm150i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_gh150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_gh150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_gl150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_gl150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_gm150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_gm150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_sl150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_sm120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_sm120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_sm150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_sm150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_7\\\":-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:16:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_15\\\":-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_panels_4\\\":-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_comfort_panels_22\\\":-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update3:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update5:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update5:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-22723 | Webtrees 2.1.18 is vulnerable to Directory Traversal. By manipulating the "media_folder" parameter in the URL, an attacker (in this case, an administrator) can navigate beyond the intended directory (the 'media/' directory) to access sensitive files in other parts of the application's file system. | [
"cpe:2.3:a:webtrees:webtrees:2.1.18:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-hm9v-m7w5-9hhj | Buffer overflow in Apple QuickTime 5.0 ActiveX component allows remote attackers to execute arbitrary code via a long pluginspage field. | [] | null | null | null | null |
|
GHSA-h2pf-jh92-mh4x | Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | [] | null | null | null | null |
|
CVE-2020-28063 | A file upload issue exists in all versions of ArticleCMS which allows malicious users to getshell. | [
"cpe:2.3:a:articlecms_project:articlecms:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2010-5300 | Stack-based buffer overflow in Jzip 1.3 through 2.0.0.132900 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name in a zip archive. | [
"cpe:2.3:a:jzip:jzip:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jzip:jzip:2.0.0.132900:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-0642 | In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149 | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-cxjg-542q-fjgf | When a user opens manipulated PhotoShop Document (.PSD) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application. | [] | null | null | null | null |
|
GHSA-3w9r-2mqj-cf5c | Integer Overflow vulnerability in qsvghandler.cpp in Qt qtsvg versions 5.15.1, 6.0.0, 6.0.2, and 6.2, allows local attackers to cause a denial of service (DoS). | [] | null | 5.5 | null | null |
|
GHSA-2wgh-9jrp-f6jq | Buffer overflow in Durian Web Application Server 3.02 freeware on Windows allows remote attackers to execute arbitrary code via a long string in a crafted packet to TCP port 4002. | [] | null | null | null | null |
|
GHSA-xr3v-r79c-636q | In easelcomm_hw_build_scatterlist, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-69808833. | [] | null | null | 6.4 | null |
|
CVE-2009-0061 | Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets. | [
"cpe:2.3:h:cisco:4400_wireless_lan_controller:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4400_wireless_lan_controller:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4400_wireless_lan_controller:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_7600_series_wireless_lan_controller:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_7600_series_wireless_lan_controller:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_7600_series_wireless_lan_controller:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-qwpw-w2v5-h4cw | Buffer overflow in CHttpServer::OnParseError in the ISAPI extension (Isapi.cpp) when built using Microsoft Foundation Class (MFC) static libraries in Visual C++ 5.0, and 6.0 before SP3, as used in multiple products including BadBlue, allows remote attackers to cause a denial of service (access violation and crash) and possibly execute arbitrary code via a long query string that causes a parsing error. | [] | null | null | null | null |
|
CVE-2010-4440 | Unspecified vulnerability in Oracle 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel. | [
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*"
] | null | null | null | 4.4 |
|
GHSA-8v7j-86mr-4824 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
CVE-2023-51928 | An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file. | [
"cpe:2.3:a:yonyou:yonbip:3_23.05:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-4pj9-45vq-jvvh | A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands. | [] | null | 6.7 | null | null |
|
CVE-2024-49548 | InDesign Desktop | Out-of-bounds Read (CWE-125) | InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2015-2759 | Multiple cross-site request forgery (CSRF) vulnerabilities in the ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3 Patch 4 Hotfix 16 (9.3.416.4) allow remote attackers to hijack the authentication of users for requests that (1) obtain sensitive information or (2) modify the database via unspecified vectors. | [
"cpe:2.3:a:mcafee:data_loss_prevention_endpoint:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-x5gm-xw9r-m7h2 | The C:\Windows\Temp\Agent.Package.Availability\Agent.Package.Availability.exe file is automatically launched as SYSTEM when the system reboots. Since the C:\Windows\Temp\Agent.Package.Availability folder inherits permissions from C:\Windows\Temp and Agent.Package.Availability.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges. | [] | null | 7.8 | null | null |
|
GHSA-xq29-jcj7-xg86 | Unspecified vulnerability in the Webkit PDFs (webkitpdf) extension before 1.1.4 for TYPO3 allows remote attackers to execute arbitrary commands via unknown vectors. | [] | null | null | null | null |
|
GHSA-gmq2-6hqw-wqw4 | Windows Partition Management Driver Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-7j8r-jxrx-cf98 | ManageIQ in CloudForms before 4.1 allows remote authenticated users to execute arbitrary code. | [] | null | null | 8.8 | null |
|
CVE-2023-45576 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the remove_ext_proto/remove_ext_port parameter of the upnp_ctrl.asp function. | [
"cpe:2.3:o:d-link:di-7003gv2.d1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:di-7200g.v2.d1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:di-7100gv2.d1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:di-7200gv2.e1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:di-7300g.v2.d1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:di-7400g.v2.d1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-fm7q-5fr8-q7xq | SQL injection vulnerability in content.php in Scripts For Sites (SFS) EZ Career allows remote attackers to execute arbitrary SQL commands via the topic parameter. | [] | null | null | null | null |
|
GHSA-qhrx-hcm6-pmrw | Unsafe deserialization in SmtpTransport in CakePHP | An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction. | [] | null | null | 7.5 | null |
GHSA-5cw3-xmmf-w5x9 | Cross-site scripting (XSS) vulnerability in Gurock TestRail before 3.1.3 allows remote attackers to inject arbitrary web script or HTML via the Created By field in a project activity. | [] | null | null | null | null |
|
GHSA-8pf9-cjf8-hr4g | The Accept Stripe Payments WordPress plugin before 2.0.64 does not sanitize and escape some of its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | [] | null | 4.8 | null | null |
|
CVE-2022-42706 | An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. | [
"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sangoma:asterisk:20.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-qq67-99wj-86rm | In the Linux kernel, the following vulnerability has been resolved:cpufreq: Avoid a bad reference count on CPU nodeIn the parse_perf_domain function, if the call to
of_parse_phandle_with_args returns an error, then the reference to the
CPU device node that was acquired at the start of the function would not
be properly decremented.Address this by declaring the variable with the __free(device_node)
cleanup attribute. | [] | null | 5.5 | null | null |
|
GHSA-m2v2-9gxp-2r53 | parisneo/lollms-webui version V13 (feather) suffers from a Server-Side Request Forgery (SSRF) vulnerability in the `POST /api/proxy` REST API. Attackers can exploit this vulnerability to abuse the victim server's credentials to access unauthorized web resources by specifying the JSON parameter `{"url":"http://steal.target"}`. Existing security mechanisms such as `forbid_remote_access(lollmsElfServer)`, `lollmsElfServer.config.headless_server_mode`, and `check_access(lollmsElfServer, request.client_id)` do not protect against this vulnerability. | [] | null | null | 7.5 | null |
|
GHSA-9rgm-96q6-gc9m | WebAccess/NMS (Versions prior to v3.0.3_Build6299) has an improper authentication vulnerability, which may allow unauthorized users to view resources monitored and controlled by the WebAccess/NMS, as well as IP addresses and names of all the devices managed via WebAccess/NMS. | [] | null | null | null | null |
|
CVE-2020-9462 | An issue was discovered in all Athom Homey and Homey Pro devices up to the current version 4.2.0. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks. | [
"cpe:2.3:o:homey:homey_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:homey:homey:-:*:*:*:*:*:*:*",
"cpe:2.3:o:homey:homey_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:homey:homey_pro:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 3.3 |
|
CVE-2005-2078 | BisonFTP Server V4R1 allows remote authenticated users to cause a denial of service via an invalid command with a long argument. | [
"cpe:2.3:a:sofotex:bisonftp:v4r1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-g8vf-gqwq-vh5h | SAP Business Objects Business Intelligence Platform (Web Intelligence HTML interface), version 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [] | null | null | null | null |
|
CVE-2024-21939 | Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. | [
"cpe:2.3:a:amd:cloud_manageability_service_acms_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amd:cloud_manageability_service:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
GHSA-hffx-r282-w2g9 | Path Traversal in Liferay Portal | A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin. | [] | null | 7.5 | null | null |
GHSA-mp9p-399h-gx5m | A vulnerability was found in code-projects Crime Reporting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file inchargelogin.php. The manipulation of the argument email/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254608. | [] | null | 7.3 | null | null |
|
CVE-2011-2291 | Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality via unknown vectors related to Trusted Extensions. | [
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] | null | null | null | 1.7 |
|
GHSA-f6fq-4j2q-5883 | Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges. | [] | null | null | null | null |
|
GHSA-3gx6-h57h-rm27 | Drupal Core Remote Code Execution Vulnerability | Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.) | [] | null | null | 8.1 | null |
RHSA-2024:2062 | Red Hat Security Advisory: Service Telemetry Framework 1.5.4 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:service_telemetry_framework:1.5::el8"
] | null | 7.5 | null | null |
CVE-2016-7102 | ownCloud Desktop before 2.2.3 allows local users to execute arbitrary code and possibly gain privileges via a Trojan library in a "special path" in the C: drive. | [
"cpe:2.3:a:owncloud:owncloud_desktop_client:*:*:*:*:*:*:*:*"
] | null | null | 8.4 | 4.6 |
|
CVE-2024-36904 | tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). | In the Linux kernel, the following vulnerability has been resolved:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique()
with nice analysis.
Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for
timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's
sk_refcnt after putting it into ehash and releasing the bucket lock.
Thus, there is a small race window where other threads could try to
reuse the port during connect() and call sock_hold() in tcp_twsk_unique()
for the TIME-WAIT socket with zero refcnt.
If that happens, the refcnt taken by tcp_twsk_unique() is overwritten
and sock_put() will cause underflow, triggering a real use-after-free
somewhere else.
To avoid the use-after-free, we need to use refcount_inc_not_zero() in
tcp_twsk_unique() and give up on reusing the port if it returns false.
[0]:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110
CPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023
RIP: 0010:refcount_warn_saturate+0xe5/0x110
Code: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff <0f> 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8
RSP: 0018:ffffc90006b43b60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027
RDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0
RBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0
R10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84
R13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0
FS: 00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
<TASK>
? refcount_warn_saturate+0xe5/0x110
? __warn+0x81/0x130
? refcount_warn_saturate+0xe5/0x110
? report_bug+0x171/0x1a0
? refcount_warn_saturate+0xe5/0x110
? handle_bug+0x3c/0x80
? exc_invalid_op+0x17/0x70
? asm_exc_invalid_op+0x1a/0x20
? refcount_warn_saturate+0xe5/0x110
tcp_twsk_unique+0x186/0x190
__inet_check_established+0x176/0x2d0
__inet_hash_connect+0x74/0x7d0
? __pfx___inet_check_established+0x10/0x10
tcp_v4_connect+0x278/0x530
__inet_stream_connect+0x10f/0x3d0
inet_stream_connect+0x3a/0x60
__sys_connect+0xa8/0xd0
__x64_sys_connect+0x18/0x20
do_syscall_64+0x83/0x170
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f62c11a885d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d
RDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003
RBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0
R13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0
</TASK> | [] | null | null | null | null |
CVE-2007-3708 | Cross-site scripting (XSS) vulnerability in CodeIgniter 1.5.3 before 20070626 allows remote attackers to inject arbitrary web script or HTML via (1) String.fromCharCode and (2) malformed nested tag manipulations in an unspecified component, related to insufficient sanitization by the xss_clean function. | [
"cpe:2.3:a:codeigniter:codeigniter:1.5.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-77x4-55q7-4vmj | Apache HugeGraph-Hubble: SSRF in Hubble connection page | Server-Side Request Forgery (SSRF) vulnerability in Apache HugeGraph-Hubble. This issue affects Apache HugeGraph-Hubble: from 1.0.0 before 1.3.0.Users are recommended to upgrade to version 1.3.0, which fixes the issue. | [] | null | 5.3 | null | null |
RHSA-2004:635 | Red Hat Security Advisory: ruby security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
CVE-2020-0071 | In rw_t2t_extract_default_locks_info of rw_t2t_ndef.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-147310721 | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-h2r8-43hj-47vm | The WooCommerce Dynamic Pricing and Discounts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.4.1. This is due to missing sanitization on the settings imported via the import() function. This makes it possible for unauthenticated attackers to import a settings file containing malicious JavaScript that would execute when an administrator accesses the settings area of the site. | [] | null | 6.5 | null | null |
|
GHSA-xwg4-93c6-3h42 | Directory Traversal in send | Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`.RecommendationUpdate to version 0.8.4 or later. | [] | null | null | null | null |
CVE-2015-0397 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2014-6600. | [
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-mw4p-mgpv-4m52 | app\admin\controller\sys\Uploads.php in lemocms 1.8.x allows users to upload files to upload executable files. | [] | null | null | null | null |
|
RHSA-2021:1518 | Red Hat Security Advisory: Red Hat Ceph Storage 3.3 Security and Bug Fix Update | ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila tcmu-runner: SCSI target (LIO) write to any block on ILO backstore | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | 8.1 | null | null |
CVE-2013-2371 | The Web API in the Statistics Server in TIBCO Spotfire Statistics Services 3.3.x before 3.3.1, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to obtain sensitive information via an unspecified HTTP request. | [
"cpe:2.3:a:tibco:spotfire_statistics_services:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_statistics_services:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_statistics_services:5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-7942 | The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have an authentication bypass vulnerability. An unauthenticated, remote attacker may send some specially crafted messages to the affected products. Due to improper authentication design, successful exploit may cause some information leak. | [
"cpe:2.3:o:huawei:1288h_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:1288h_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:2288h_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:2288h_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:2488_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:2488_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch242_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121l_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121l_v5_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121_v3:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-j5gp-2w8h-r25r | The WOHyperlink implementation in WebObjects in Apple Xcode tools before 3.1 appends local session IDs to generated non-local URLs, which allows remote attackers to obtain potentially sensitive information by reading the requests for these URLs. | [] | null | null | null | null |
|
GHSA-2cg4-7q4x-7rr2 | mc-kill-port vulnerable to Arbitrary Command Execution via kill function | All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the `kill` function, due to missing sanitization of the `port` argument. | [] | null | 7.8 | null | null |
GHSA-3jv4-4ccq-7qx5 | AXIS IP Utility prior to 4.17.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder. | [] | null | 7.8 | null | null |
|
CVE-2019-10069 | In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly. | [
"cpe:2.3:a:godotengine:godot:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-r228-w758-3qfv | Dell BSAFE SSL-J when used in debug mode can reveal unnecessary information. An attacker could potentially exploit this vulnerability and have access to private information. | [] | null | 4.4 | null | null |
|
GHSA-cmx3-qq55-47x6 | Buffer overflow in swfformat.dll in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix Player allows remote attackers to execute arbitrary code via a crafted SWF (Flash) file with (1) a size value that is less than the actual size, or (2) other unspecified manipulations. | [] | null | null | null | null |
|
CVE-2024-44130 | This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15. An app with root privileges may be able to access private information. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2019-1726 | Cisco NX-OS Software CLI Bypass to Internal Service Vulnerability | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to access internal services that should be restricted on an affected device, such as the NX-API. The vulnerability is due to insufficient validation of arguments passed to a certain CLI command. An attacker could exploit this vulnerability by including malicious input as the argument to the affected command. A successful exploit could allow the attacker to bypass intended restrictions and access internal services of the device. An attacker would need valid device credentials to exploit this vulnerability. | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
CVE-2021-3450 | CA certificate check bypass with X509_V_FLAG_X509_STRICT | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j). | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*",
"cpe:2.3:o:netapp:santricity_smi-s_provider_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:storagegrid_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:linux:-:*:*:*:cd:*:*:*",
"cpe:2.3:o:windriver:linux:17.0:*:*:*:lts:*:*:*",
"cpe:2.3:o:windriver:linux:18.0:*:*:*:lts:*:*:*",
"cpe:2.3:o:windriver:linux:19.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma100:-:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:capture_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"
] | null | 7.4 | null | 5.8 |
GHSA-8wmf-4j4m-q5h7 | : Path Traversal vulnerability in Pandora FMS on all allows Path Traversal. This vulnerability allowed changing directories and creating files and downloading them outside the allowed directories. This issue affects Pandora FMS: from 700 through <776. | [] | null | 6.7 | null | null |
|
GHSA-pfm2-mqwj-ggm5 | MediaWiki makeCollapsible allows applying event handler to any CSS selector | In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS). | [] | null | 5.3 | null | null |
GHSA-xqc2-xvq9-7x34 | A flaw was found in gnuplot. The GetAnnotateString() function may lead to a segmentation fault and cause a system crash. | [] | null | 6.2 | null | null |
|
ICSA-22-104-16 | Siemens TIA Administrator | The affected system cannot properly process specially crafted packets sent to port 8888/tcp. A remote attacker could exploit this vulnerability to cause a Denial-of-Service condition. The affected devices must be restarted manually. CVE-2022-27194 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | 7.5 | null | null |
Subsets and Splits