id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2008-4067 | Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-xq76-5h8q-6j3h | WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to XXE injection. | []
| null | 9.8 | null | null |
|
GHSA-gv7p-4h64-hm86 | Directory traversal vulnerability in main.php in PCPIN Chat 5.0.4 and earlier allows remote authenticated users to include and execute arbitrary PHP code via a ".." (dot dot) in a language cookie, as demonstrated by uploading then accessing a smiliefile image that actually contains PHP code. | []
| null | null | null | null |
|
CVE-2017-18569 | The my-wp-translate plugin before 1.0.4 for WordPress has CSRF. | [
"cpe:2.3:a:mythemeshop:my_wp_translate:*:*:*:*:*:wordpress:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2018-1778 | IBM LoopBack (IBM API Connect 2018.1, 2018.4.1, 5.0.8.0, and 5.0.8.4) could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, it is then possible for anyone to create an AccessToken for any User provided they know the userId and can hence get access to the other user’s data / access to their privileges (if the user happens to be an Admin for example). IBM X-Force ID: 148801. | [
"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*"
]
| null | null | 7.7 | null |
|
GHSA-46c6-wcjc-4jq6 | Orinoco RG-1000 wireless Residential Gateway uses the last 5 digits of the 'Network Name' or SSID as the default Wired Equivalent Privacy (WEP) encryption key. Since the SSID occurs in the clear during communications, a remote attacker could determine the WEP key and decrypt RG-1000 traffic. | []
| null | null | null | null |
|
GHSA-5qh7-jx7c-whvp | A vulnerability, which was classified as problematic, has been found in FNKvision FNK-GU2 up to 40.1.7. Affected by this issue is some unknown functionality of the file /rom/wpa_supplicant.conf. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. | []
| 0.3 | 1.6 | null | null |
|
CVE-2023-24931 | Windows Secure Channel Denial of Service Vulnerability | Windows Secure Channel Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-p2xf-hx7j-w83r | H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the Edit_BasicSSID interface at /goform/aspForm. | []
| null | 7.2 | null | null |
|
ICSA-18-163-01 | Schneider Electric U.motion Builder | An input string may be evaluated as a command by the application. An attacker could exploit this to execute code, read the stack, or cause a segmentation fault in the running application.CVE-2018-7784 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). A remote command injection allows authentication bypass.CVE-2018-7785 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). A cross-site scripting (XSS) vulnerability exists, which could allow injection of malicious scripts.CVE-2018-7786 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). This vulnerability is due to improper validation of input of context parameter in HTTP GET request, which could allow the disclosure of sensitive information.CVE-2018-7787 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | 5.3 | null |
RHSA-2023:6828 | Red Hat Security Advisory: ACS 4.1 enhancement update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:advanced_cluster_security:4.1::el8"
]
| null | 7.5 | null | null |
GHSA-6rpm-g6rr-f2wx | There is Missing SSL Certificate Validation in the pw3270 terminal emulator before version 5.1. | []
| null | null | 8.1 | null |
|
GHSA-prmr-9r7g-hrvr | Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D6100 before 1.0.0.56, D7800 before 1.0.1.30, R6100 before 1.0.1.20, R7500 before 1.0.0.118, R7500v2 before 1.0.3.24, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62. | []
| null | null | null | null |
|
CVE-2019-2687 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
]
| null | 4.9 | null | 4 |
|
GHSA-8gcg-pj32-gq6h | In the Linux kernel, the following vulnerability has been resolved:power: supply: max77705: Fix workqueue error handling in probeThe create_singlethread_workqueue() doesn't return error pointers, it
returns NULL. Also cleanup the workqueue on the error paths. | []
| null | null | null | null |
|
GHSA-v6rj-97q7-pq94 | MEDHOST Perioperative Information Management System (aka PIMS or VPIMS) before 2015R1 has hardcoded credentials, which makes it easier for remote attackers to obtain sensitive information via direct requests to the application database server. | []
| null | null | 9.8 | null |
|
CVE-2024-2890 | WordPress Tumult Hype Animations plugin <= 1.9.12 - Arbitrary File Upload vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in Tumult Inc. Tumult Hype Animations.This issue affects Tumult Hype Animations: from n/a through 1.9.12.
| [
"cpe:2.3:a:tumult:tumult_hype_animations:*:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
CVE-2018-15752 | An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. Cleartext Transmission of Sensitive Information allows man-in-the-middle attackers to eavesdrop authentication information between the application and the server. | [
"cpe:2.3:a:mensamax:mensamax:4.3:*:*:*:*:android:*:*"
]
| null | null | 8.1 | 4.3 |
|
RHSA-2024:2778 | Red Hat Security Advisory: nodejs:20 security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.3 | null | null |
cisco-sa-20181107-meraki | Cisco Meraki Local Status Page Privilege Escalation Vulnerability | A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote attacker to modify device configuration files.
The vulnerability occurs when handling requests to the local status page. An exploit could allow the attacker to establish an interactive session to the device with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device that is being exploited.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-meraki ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-meraki"] | []
| null | null | 8.8 | null |
GHSA-fp64-r8jf-r586 | In the Linux kernel, the following vulnerability has been resolved:btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()In btrfs_relocate_block_group(), the rc is allocated. Then
btrfs_relocate_block_group() callsrelocate_block_group()
prepare_to_relocate()
set_reloc_control()that assigns rc to the variable fs_info->reloc_ctl. When
prepare_to_relocate() returns, it callsbtrfs_commit_transaction()
btrfs_start_dirty_block_groups()
btrfs_alloc_path()
kmem_cache_zalloc()which may fail for example (or other errors could happen). When the
failure occurs, btrfs_relocate_block_group() detects the error and frees
rc and doesn't set fs_info->reloc_ctl to NULL. After that, in
btrfs_init_reloc_root(), rc is retrieved from fs_info->reloc_ctl and
then used, which may cause a use-after-free bug.This possible bug can be triggered by calling btrfs_ioctl_balance()
before calling btrfs_ioctl_defrag().To fix this possible bug, in prepare_to_relocate(), check if
btrfs_commit_transaction() fails. If the failure occurs,
unset_reloc_control() is called to set fs_info->reloc_ctl to NULL.The error log in our fault-injection testing is shown as follows:[ 58.751070] BUG: KASAN: use-after-free in btrfs_init_reloc_root+0x7ca/0x920 [btrfs]
...
[ 58.753577] Call Trace:
...
[ 58.755800] kasan_report+0x45/0x60
[ 58.756066] btrfs_init_reloc_root+0x7ca/0x920 [btrfs]
[ 58.757304] record_root_in_trans+0x792/0xa10 [btrfs]
[ 58.757748] btrfs_record_root_in_trans+0x463/0x4f0 [btrfs]
[ 58.758231] start_transaction+0x896/0x2950 [btrfs]
[ 58.758661] btrfs_defrag_root+0x250/0xc00 [btrfs]
[ 58.759083] btrfs_ioctl_defrag+0x467/0xa00 [btrfs]
[ 58.759513] btrfs_ioctl+0x3c95/0x114e0 [btrfs]
...
[ 58.768510] Allocated by task 23683:
[ 58.768777] ____kasan_kmalloc+0xb5/0xf0
[ 58.769069] __kmalloc+0x227/0x3d0
[ 58.769325] alloc_reloc_control+0x10a/0x3d0 [btrfs]
[ 58.769755] btrfs_relocate_block_group+0x7aa/0x1e20 [btrfs]
[ 58.770228] btrfs_relocate_chunk+0xf1/0x760 [btrfs]
[ 58.770655] __btrfs_balance+0x1326/0x1f10 [btrfs]
[ 58.771071] btrfs_balance+0x3150/0x3d30 [btrfs]
[ 58.771472] btrfs_ioctl_balance+0xd84/0x1410 [btrfs]
[ 58.771902] btrfs_ioctl+0x4caa/0x114e0 [btrfs]
...
[ 58.773337] Freed by task 23683:
...
[ 58.774815] kfree+0xda/0x2b0
[ 58.775038] free_reloc_control+0x1d6/0x220 [btrfs]
[ 58.775465] btrfs_relocate_block_group+0x115c/0x1e20 [btrfs]
[ 58.775944] btrfs_relocate_chunk+0xf1/0x760 [btrfs]
[ 58.776369] __btrfs_balance+0x1326/0x1f10 [btrfs]
[ 58.776784] btrfs_balance+0x3150/0x3d30 [btrfs]
[ 58.777185] btrfs_ioctl_balance+0xd84/0x1410 [btrfs]
[ 58.777621] btrfs_ioctl+0x4caa/0x114e0 [btrfs]
... | []
| null | null | null | null |
|
GHSA-h2f8-mwf2-cx6g | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/save-article.php by adding a question mark (?) followed by the payload. | []
| null | 4.8 | null | null |
|
GHSA-wwhr-xmj9-h562 | Codoforum 4.8.3 allows XSS in the admin dashboard via a name field of a new user, i.e., on the Manage Users screen. | []
| null | null | null | null |
|
CVE-2022-29628 | A cross-site scripting (XSS) vulnerability in /omps/seller of Online Market Place Site v1.0 allows attackers to execute arbitrary web cripts or HTML via a crafted payload injected into the Page parameter. | [
"cpe:2.3:a:online_market_place_site_project:online_market_place_site:1.0:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2024-7878 | WP ULike < 4.7.4 - Admin+ Stored XSS | The WP ULike WordPress plugin before 4.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [
"cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*"
]
| null | 4.8 | null | null |
GHSA-w974-55hm-qp53 | Windows Hyper-V Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
|
GHSA-xw7j-cq8f-4pjw | Online Ordering System By janobe 2.3.2 has SQL Injection via /ordering/admin/products/index.php?view=edit&id=. | []
| null | 9.8 | null | null |
|
CVE-2017-8944 | A Remote Disclosure of Information vulnerability in HPE Cloud Optimizer version v3.0x was found. | [
"cpe:2.3:a:hp:cloud_optimizer:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
CVE-2015-0775 | The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182. | [
"cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1f\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zn\\(99.67\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:mds_9000_nx-os:6.2\\(11\\):*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-38723 | Maximo Asset Management cross-site scripting | IBM Maximo Application Suite 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 262192. | []
| null | 6.4 | null | null |
GHSA-p623-p97g-jv85 | Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Flex Fields). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | []
| null | null | null | null |
|
CVE-2015-0458 | Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. | [
"cpe:2.3:a:oracle:jdk:1.6.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update40:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.6 |
|
GHSA-wqr3-24xm-fxhq | Directory Traversal in wffserve | Affected versions of `wffserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | []
| null | null | 7.5 | null |
GHSA-pg3x-xr3j-9vv7 | An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Information Disclosure Vulnerability'. | []
| null | null | 5.5 | null |
|
CVE-2000-0547 | Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function. | [
"cpe:2.3:a:cygnus_network_security_project:cygnus_network_security:-:*:*:*:*:*:*:*",
"cpe:2.3:a:kerbnet_project:kerbnet:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:4.0:patch10:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2017-5803 | A Remote Disclosure of Information vulnerability in HPE NonStop Servers using SSH Service version L series: T0801L02 through T0801L02^ABX; J and H series: T0801H01 through T0801H01^ACA was found. | [
"cpe:2.3:a:hp:nonstop_server_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:nonstop_server:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
CVE-2025-7150 | Campcodes Advanced Online Voting System voters_delete.php sql injection | A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/voters_delete.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-xw7q-2j98-xv6p | Dell Unity prior to 5.3 contains a Cross-site scripting vulnerability. A low-privileged authenticated attacker can exploit these issues to obtain escalated privileges. | []
| null | 5.5 | null | null |
|
CVE-2016-9037 | An exploitable out-of-bounds array access vulnerability exists in the xrow_header_decode function of Tarantool 1.7.2.0-g8e92715. A specially crafted packet can cause the function to access an element outside the bounds of a global array that is used to determine the type of the specified key's value. This can lead to an out of bounds read within the context of the server. An attacker who exploits this vulnerability can cause a denial of service vulnerability on the server. | [
"cpe:2.3:a:tarantool:tarantool:1.7.2:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
|
GHSA-c27c-3q9w-fj4p | A vulnerability in the user management roles of Cisco DNA Center could allow an authenticated, remote attacker to execute unauthorized commands on an affected device.
The vulnerability is due to improper enforcement of actions for assigned user roles. An attacker could exploit this vulnerability by authenticating as a user with an Observer role and executing commands on the affected device. A successful exploit could allow a user with the Observer role to execute commands to view diagnostic information of the devices that Cisco DNA Center manages. | []
| null | null | null | null |
|
RHSA-2014:1359 | Red Hat Security Advisory: polkit-qt security update | polkit-qt: insecure calling of polkit | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
CVE-2022-27405 | FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request. | [
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2025-30095 | VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run "rm -f /etc/dropbear/*key*" and/or "rm -f /etc/dropbear-initramfs/*key*" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear. | []
| null | 9 | null | null |
|
GHSA-6mcv-9288-fjqm | Missing Authorization vulnerability in WPDeveloper Simple 301 Redirects by BetterLinks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple 301 Redirects by BetterLinks: from n/a through 2.0.7. | []
| null | 4.3 | null | null |
|
CVE-2022-36720 | Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/modify1.php. | [
"cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2025-48751 | The process_lock crate 0.1.0 for Rust allows data races in unlock. | []
| null | 2.9 | null | null |
|
CVE-2019-16240 | A Buffer Overflow and Information Disclosure issue exists in HP OfficeJet Pro Printers before 001.1937C, and HP PageWide Managed Printers and HP PageWide Pro Printers before 001.1937D exists; A maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device. | [
"cpe:2.3:o:hp:pagewide_pro_577z_k9z76a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577z_k9z76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_577z_k9z76b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577z_k9z76b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_577z_k9z76d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577z_k9z76d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_577dw_d3q21a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577dw_d3q21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_577dw_d3q21b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577dw_d3q21b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_577dw_d3q21c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577dw_d3q21c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_577dw_d3q21d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_577dw_d3q21d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_552dw_2dr21d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_552dw_2dr21d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_552dw_d3q17a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_552dw_d3q17a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_552dw_d3q17d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_552dw_d3q17d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_552dw_k9z74a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_552dw_k9z74a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_552dw_k9z74d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_552dw_k9z74d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dw_d3q20a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dw_d3q20a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dw_d3q20b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dw_d3q20b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dw_d3q20c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dw_d3q20c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dw_d3q20d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dw_d3q20d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dw_w2z53b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dw_w2z53b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dn_d3q19d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dn_d3q19d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dn_d3q19b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dn_d3q19b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_477dn_d3q19a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_477dn_d3q19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_452dw_w2z52b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_452dw_w2z52b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_452dw_d3q16d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_452dw_d3q16d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_452dw_d3q16a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_452dw_d3q16a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_452dn_d3q15d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_452dn_d3q15d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_452dn_d3q15b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_452dn_d3q15b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_pro_452dn_d3q15a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_pro_452dn_d3q15a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p52750dw_j9v78b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p52750dw_j9v78b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p52750dw_j9v82d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p52750dw_j9v82d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p52750dw_j9v82a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p52750dw_j9v82a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p57750dw_j9v78b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p57750dw_j9v78b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p57750dw_j9v82d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p57750dw_j9v82d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p57750dw_j9v82a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p57750dw_j9v82a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u51b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u51b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u55d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u55d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_managed_p55250dw_j6u55a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_managed_p55250dw_j6u55a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_377dw_j9v80b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_377dw_j9v80b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_377dw_j9v80a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_377dw_j9v80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_352dw_j6u57b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_352dw_j6u57b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pagewide_352dw_j6u57a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pagewide_352dw_j6u57a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officejet_pro_8210_d9l63a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_pro_8210_d9l63a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officejet_pro_8210_d9l64a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_pro_8210_d9l64a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officejet_pro_8210_j3p65a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_pro_8210_j3p65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officejet_pro_8210_j3p68a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_pro_8210_j3p68a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officejet_pro_8210_t0g70a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_pro_8210_t0g70a:-:*:*:*:*:*:*:*"
]
| null | 9.1 | null | 5.8 |
|
CVE-2024-4776 | A file dialog shown while in full-screen mode could have resulted in the window remaining disabled. This vulnerability affects Firefox < 126. | [
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*"
]
| null | 8.2 | null | null |
|
CVE-2008-3755 | SQL injection vulnerability in view.php in YourFreeWorld Classifieds Script allows remote attackers to execute arbitrary SQL commands via the category parameter. | [
"cpe:2.3:a:yourfreeworld:classifieds:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-fcqc-4m7c-74f8 | Buffer overflow in the NetBackup Sharepoint Services server daemon (bpspsserver) on NetBackup 6.0 for Windows allows remote attackers to execute arbitrary code via crafted "Request Service" packets to the vnetd service (TCP port 13724). | []
| null | null | null | null |
|
GHSA-w6qf-42m7-vh68 | Undertow Uncontrolled Resource Consumption Vulnerability | A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak. | []
| 8.7 | 7.5 | null | null |
GHSA-jqh3-938p-63qc | Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz. | []
| null | null | null | null |
|
GHSA-9r4m-vc45-52hp | A stack-based buffer overflow vulnerability exists in NI System Configuration that could result in information disclosure and/or arbitrary code execution. Successful exploitation requires that an attacker can provide a specially crafted response. This affects NI System Configuration 2023 Q3 and all previous versions. | []
| null | 8.1 | null | null |
|
GHSA-59jw-jqf4-3wq3 | XStream is vulnerable to an Arbitrary Code Execution attack | ImpactThe vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.WorkaroundsSee [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html).Credits钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | []
| null | 5.3 | null | null |
CVE-2021-34423 | Buffer overflow in Zoom client and other products | A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code. | [
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:meetings_for_blackberry:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:meetings_for_intune:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:meetings_for_chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:android_meeting_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:iphone_os_meeting_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:macos_meeting_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:windows_meeting_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:android_video_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:iphone_os_video_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:macos_video_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:windows_video_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:hybrid_mmr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:hybrid_zproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:zoom_on-premise_meeting_connector_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:zoom_on-premise_meeting_connector_mmr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:zoom_on-premise_recording_connector:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:zoom_on-premise_virtual_room_connector:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:zoom_on-premise_virtual_room_connector_load_balancer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:vdi_azure_virtual_desktop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:vdi_citrix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:vdi_vmware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zoom:vdi_windows_meeting_client:*:*:*:*:*:*:*:*"
]
| null | null | 7.3 | null |
cisco-sa-ftd-sidns-bypass-3PzA5pO | Cisco Firepower Threat Defense Software Security Intelligence DNS Feed Bypass Vulnerability | A vulnerability in the Security Intelligence feed feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the Security Intelligence DNS feed.
This vulnerability is due to incorrect feed update processing. An attacker could exploit this vulnerability by sending traffic through an affected device that should be blocked by the affected device. A successful exploit could allow the attacker to bypass device controls and successfully send traffic to devices that are expected to be protected by the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"]. | []
| null | 4 | null | null |
GHSA-654v-ffqc-qrmf | Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem. | []
| 6 | 6.5 | null | null |
|
CVE-2024-23374 | Stack-based Buffer Overflow in Power Management IC | Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file. | [
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
GHSA-9p52-q967-6rwj | Special characters of IGT search function in igt+ are not filtered in specific fields, which allow remote authenticated attackers can inject malicious JavaScript and carry out DOM-based XSS (Cross-site scripting) attacks. | []
| null | null | null | null |
|
RHSA-2024:3324 | Red Hat Security Advisory: pcp security, bug fix, and enhancement update | pcp: exposure of the redis server backend allows remote command execution via pmproxy | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
]
| null | 8.8 | null | null |
CVE-2014-6280 | Multiple cross-site scripting (XSS) vulnerabilities in OSClass before 3.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) action or (2) nsextt parameter to oc-admin/index.php or the (3) nsextt parameter in an items_reported action to oc-admin/index.php. | [
"cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osclass:osclass:3.4.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2024-2687 | Campcodes Online Job Finder System index.php sql injection | A vulnerability was found in Campcodes Online Job Finder System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/applicants/index.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257387. | [
"cpe:2.3:a:campcodes:online_job_finder_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
CVE-2017-0533 | An information disclosure vulnerability in the Qualcomm video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32509422. References: QC-CR#1088206. | [
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 2.6 |
|
CVE-2011-3023 | Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to drag-and-drop operations. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-x7g8-97jm-3vpj | A use after free vulnerability in iva_ctl driver prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault. | []
| null | 7.8 | null | null |
|
CVE-2008-0339 | Unspecified vulnerability in the XML DB component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 has unknown impact and remote attack vectors, aka DB01. | [
"cpe:2.3:a:oracle:database_server:9.2.0.8dv:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
PYSEC-2018-80 | null | aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie). | []
| null | null | null | null |
CVE-2018-19755 | There is an illegal address access at asm/preproc.c (function: is_mmacro) in Netwide Assembler (NASM) 2.14rc16 that will cause a denial of service (out-of-bounds array access) because a certain conversion can result in a negative integer. | [
"cpe:2.3:a:nasm:netwide_assembler:12.14:rc16:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
RHSA-2024:1267 | Red Hat Security Advisory: OpenShift Container Platform 4.12.53 packages and security update | kube-controller-manager: malformed HPA v1 manifest causes crash | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
]
| null | 7.7 | null | null |
CVE-2024-58034 | memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() | In the Linux kernel, the following vulnerability has been resolved:
memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code()
As of_find_node_by_name() release the reference of the argument device
node, tegra_emc_find_node_by_ram_code() releases some device nodes while
still in use, resulting in possible UAFs. According to the bindings and
the in-tree DTS files, the "emc-tables" node is always device's child
node with the property "nvidia,use-ram-code", and the "lpddr2" node is a
child of the "emc-tables" node. Thus utilize the
for_each_child_of_node() macro and of_get_child_by_name() instead of
of_find_node_by_name() to simplify the code.
This bug was found by an experimental verification tool that I am
developing.
[krzysztof: applied v1, adjust the commit msg to incorporate v2 parts] | []
| null | 7.8 | null | null |
GHSA-8mgg-gfxm-vwwc | The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute. | []
| null | null | null | null |
|
CVE-2025-21850 | nvmet: Fix crash when a namespace is disabled | In the Linux kernel, the following vulnerability has been resolved:
nvmet: Fix crash when a namespace is disabled
The namespace percpu counter protects pending I/O, and we can
only safely diable the namespace once the counter drop to zero.
Otherwise we end up with a crash when running blktests/nvme/058
(eg for loop transport):
[ 2352.930426] [ T53909] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI
[ 2352.930431] [ T53909] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
[ 2352.930434] [ T53909] CPU: 3 UID: 0 PID: 53909 Comm: kworker/u16:5 Tainted: G W 6.13.0-rc6 #232
[ 2352.930438] [ T53909] Tainted: [W]=WARN
[ 2352.930440] [ T53909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
[ 2352.930443] [ T53909] Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]
[ 2352.930449] [ T53909] RIP: 0010:blkcg_set_ioprio+0x44/0x180
as the queue is already torn down when calling submit_bio();
So we need to init the percpu counter in nvmet_ns_enable(), and
wait for it to drop to zero in nvmet_ns_disable() to avoid having
I/O pending after the namespace has been disabled. | []
| null | 5.5 | null | null |
CVE-2016-2971 | IBM Sametime Media Services 8.5.2 and 9.0 can disclose sensitive information in stack trace error logs that could aid an attacker in future attacks. IBM X-Force ID: 113898. | [
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.1:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
CVE-2018-1000634 | The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains an Improper Access Control vulnerability in User management that can result in administrative user with privilege restrictions logging in as a more powerful administrator. This attack appear to be exploitable via Use user administration privilege to set the password of a more powerful administrator. This vulnerability appears to have been fixed in 5.4.7. | [
"cpe:2.3:a:openmicroscopy:omero:*:*:*:*:*:*:*:*"
]
| null | null | 7.2 | 6.5 |
|
GHSA-q338-m4f4-2mm6 | TencentOS-tiny version 3.1.0 is vulnerable to integer wrap-around in function 'tos_mmheap_alloc incorrect calculation of effective memory allocation size. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. | []
| null | 9.8 | null | null |
|
CVE-2022-43590 | A null pointer dereference vulnerability exists in the handle_ioctl_0x830a0_systembuffer functionality of Callback technologies CBFS Filter 20.0.8317. A specially crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. | [
"cpe:2.3:a:callback:cbfs_filter:20.0.8317:*:*:*:*:*:*:*"
]
| null | null | 6.2 | null |
|
GHSA-47mw-v2x7-h3jj | The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system("/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnerability that allows creation of the required file under /data. | []
| null | null | null | null |
|
GHSA-qqfg-frwj-847v | Untrusted search path vulnerability in Microsoft Internet Explorer 9 on Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability." | []
| null | null | null | null |
|
GHSA-7r8w-3f57-vjqg | A vulnerability, which was classified as critical, was found in D-Link DIR-605L 2.13B01 BETA. Affected is the function formWlanWizardSetup of the file /goform/formWlanWizardSetup. The manipulation of the argument webpage leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 8.7 | 8.8 | null | null |
|
CVE-2021-41584 | Gradle Enterprise before 2021.1.3 can allow unauthorized viewing of a response (information disclosure of possibly sensitive build/configuration details) via a crafted HTTP request with the X-Gradle-Enterprise-Ajax-Request header. | [
"cpe:2.3:a:gradle:gradle:*:*:*:*:enterprise:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-cqp7-2728-738c | The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.5.6 via the element_pack_ajax_search function. This makes it possible for unauthenticated attackers to extract sensitive data including password protected post details. | []
| null | 5.3 | null | null |
|
GHSA-h277-5r6v-m3gv | Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences. | []
| null | null | 8.1 | null |
|
RHSA-2022:6503 | Red Hat Security Advisory: openvswitch2.17 security update | dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
]
| null | 6.5 | null | null |
CVE-2024-27757 | flusity CMS through 2.45 allows tools/addons_model.php Gallery Name XSS. The reporter indicates that this product "ceased its development as of February 2024." | [
"cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-xm4r-f4rc-2jjh | Buffer overflow in thttpd HTTP server before 2.04-31 allows remote attackers to execute arbitrary commands via a long date string, which is not properly handled by the tdate_parse function. | []
| null | null | null | null |
|
GHSA-5mrr-fx45-wmm7 | An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors.
QuTScloud is not affected.We have already fixed the vulnerability in the following versions:
QTS 5.2.0.2782 build 20240601 and later
QuTS hero h5.2.0.2782 build 20240601 and later | []
| null | 2.6 | null | null |
|
CVE-2007-3622 | Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages. | [
"cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*"
]
| null | null | null | 2.6 |
|
CVE-2022-40887 | SourceCodester Best Student Result Management System 1.0 is vulnerable to SQL Injection. | [
"cpe:2.3:a:best_student_result_management_system_project:best_student_result_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2016-1041 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, CVE-2016-1039, CVE-2016-1040, CVE-2016-1042, CVE-2016-1044, CVE-2016-1062, and CVE-2016-1117. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
]
| null | null | 10 | 10 |
|
GHSA-jhg5-q2mj-r9vh | In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: Fix dereference of null pointer flowIn the case where chain->flags & NFT_CHAIN_HW_OFFLOAD is false then
nft_flow_rule_create is not called and flow is NULL. The subsequent
error handling execution via label err_destroy_flow_rule will lead
to a null pointer dereference on flow when calling nft_flow_rule_destroy.
Since the error path to err_destroy_flow_rule has to cater for null
and non-null flows, only call nft_flow_rule_destroy if flow is non-null
to fix this issue.Addresses-Coverity: ("Explicity null dereference") | []
| null | 5.5 | null | null |
|
GHSA-7m6w-cvrv-x8wx | OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product. | []
| null | 9.8 | null | null |
|
GHSA-frh2-p6wj-8w5h | SQL injection vulnerability in TIMTAB social bookmark icons (timtab_sociable) 2.0.4 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. | []
| null | null | null | null |
|
GHSA-mpw3-gmf9-cxjh | D-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via the User parameter or Pwd parameter to Login.asp. | []
| null | 7.5 | null | null |
|
CVE-2024-26309 | Archer Platform 6.x before 6.14 P2 HF2 (6.14.0.2.2) contains a sensitive information disclosure vulnerability. An unauthenticated attacker could potentially obtain access to sensitive information via an internal URL. | [
"cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2023-23987 | WordPress User Registration Plugin <= 2.3.0 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPEverest User Registration plugin <= 2.3.0 versions. | [
"cpe:2.3:a:wpeverest:user_registration:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
CVE-2009-3839 | Unspecified vulnerability in the Solaris Trusted Extensions Policy configuration in Sun Solaris 10, and OpenSolaris snv_37 through snv_125, might allow remote attackers to execute arbitrary code by leveraging access to the X server. | [
"cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_120:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_121:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_122:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_123:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_124:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_125:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_118:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_120:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_121:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_122:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_123:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_125:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2025-29915 | Suricata af-packet: defrag option can lead to truncated packets affecting visibility | Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. The AF_PACKET defrag option is enabled by default and allows AF_PACKET to re-assemble fragmented packets before reaching Suricata. However the default packet size in Suricata is based on the network interface MTU which leads to Suricata seeing truncated packets. Upgrade to Suricata 7.0.9, which uses better defaults and adds warnings for user configurations that may lead to issues. | []
| null | 7.5 | null | null |
GHSA-pcqx-qgqf-w5jw | Windows NT allows remote attackers to list all users in a domain by obtaining the domain SID with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users. | []
| null | null | null | null |
|
RHSA-2022:8431 | Red Hat Security Advisory: podman security, bug fix, and enhancement update | podman: possible information disclosure and modification buildah: possible information disclosure and modification | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.1 | null | null |
CVE-2016-8620 | The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input. | [
"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.