id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2016-3215
Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 1511, and Microsoft Edge allow remote attackers to obtain sensitive information from process memory via a crafted PDF document, aka "Windows PDF Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3201.
[ "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2024-38609
wifi: mt76: connac: check for null before dereferencing
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: connac: check for null before dereferencing The wcid can be NULL. It should be checked for validity before dereferencing it to avoid crash.
[]
null
5.5
null
null
GHSA-68gj-fr3h-542g
OpenVAS Manager v2.0.3 allows plugin remote code execution.
[]
null
null
null
null
CVE-2018-12023
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
[ "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:automation_manager:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:decision_manager:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_brms:6.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*" ]
null
null
7.5
5.1
CVE-2018-21225
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7000 before 1.0.1.60, D7800 before 1.0.1.34, D8500 before 1.0.3.39, R6700 before 1.0.1.30, R6700v2 before 1.2.0.16, R6800 before 1.2.0.16, R6900 before 1.0.1.30, R6900P before 1.2.0.22, R6900v2 before 1.2.0.16, R7000 before 1.0.9.12, R7000P before 1.2.0.22, R7500v2 before 1.0.3.20, R7800 before 1.0.2.44, R8300 before 1.0.2.106, R8500 before 1.0.2.106, and R9000 before 1.0.2.52.
[ "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*" ]
null
null
6.8
null
GHSA-7cjp-4xf4-wwrm
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Survey Maker team Survey Maker allows Stored XSS.This issue affects Survey Maker: from n/a through 5.0.2.
[]
null
5.9
null
null
CVE-2022-1976
A flaw was found in the Linux kernel’s implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2004-2395
Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer.
[ "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" ]
null
null
null
2.1
CVE-2014-1731
core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2003-0372
Signed integer vulnerability in libnasl in Nessus before 2.0.6 allows local users with plugin upload privileges to cause a denial of service (core dump) and possibly execute arbitrary code by causing a negative argument to be provided to the insstr function as used in a NASL script.
[ "cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2024-22138
WordPress Seraphinite Accelerator plugin <= 2.20.47 - Sensitive Data Exposure via Log File vulnerability
Insertion of Sensitive Information into Log File vulnerability in Seraphinite Solutions Seraphinite Accelerator.This issue affects Seraphinite Accelerator: from n/a through 2.20.47.
[ "cpe:2.3:a:seraphinitesolutions:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
RHSA-2022:8415
Red Hat Security Advisory: mingw-gcc security and bug fix update
gcc: uncontrolled recursion in libiberty/rust-demangle.c
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.3
null
null
CVE-2023-31617
An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[ "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*" ]
null
7.5
null
null
GHSA-2gwg-wcpq-6h7g
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
CVE-2005-10002
almosteffortless secure-files Plugin secure-files.php sf_downloads path traversal
A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.
[ "cpe:2.3:a:wp-plugins:secure_files:*:*:*:*:*:wordpress:*:*" ]
null
5.5
5.5
5.2
GHSA-9x52-v9m6-wjvv
Enigmail 1.7.x before 1.7.2 sends emails in plaintext when encryption is enabled and only BCC recipients are specified, which allows remote attackers to obtain sensitive information by sniffing the network.
[]
null
null
null
null
GHSA-x69g-pvvj-r464
A SQL injection vulnerability exists in Simple Task Scheduling System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL database through the vulnerable "id" parameter.
[]
null
9.8
null
null
GHSA-whwp-qcc5-m653
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak /opt/axess/var/blobstorage/ permissions.
[]
null
5.3
null
null
CVE-2024-9554
Sovell Smart Canteen System Password Reset suanfa.py Check_ET_CheckPwdz201 authorization
A vulnerability classified as problematic was found in Sovell Smart Canteen System up to 3.0.7303.30513. Affected by this vulnerability is the function Check_ET_CheckPwdz201 of the file suanfa.py of the component Password Reset Handler. The manipulation leads to authorization bypass. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:sovell:smart_canteen_system:*:*:*:*:*:*:*:*" ]
6.3
3.7
3.7
2.6
CVE-2007-6392
SQL injection vulnerability in DWdirectory 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the search parameter to the /search URI.
[ "cpe:2.3:a:dominion_web:dwdirectory:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-36832
Indeed Membership Pro 7.3 - 8.6 - Authentication Bypass
The Ultimate Membership Pro plugin for WordPress is vulnerable to Authentication Bypass in versions between, and including, 7.3 to 8.6. This makes it possible for unauthenticated attackers to login as any user, including the site administrator with a default user ID of 1, via the username or user ID.
[ "cpe:2.3:a:wpindeed:ultimate_membership_pro:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-79wx-gv54-97wp
Multiple cross-site scripting (XSS) vulnerabilities in interna/hilfe.php in Papoo 3 RC3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) titel or (2) ausgabe parameters.
[]
null
null
null
null
GHSA-jw7m-fmfj-94v7
A vulnerability was found in TCS BaNCS 10. It has been classified as problematic. This affects an unknown part of the file /REPORTS/REPORTS_SHOW_FILE.jsp. The manipulation of the argument FilePath leads to file inclusion.
[]
5.1
5.5
null
null
GHSA-r4fr-75hr-j5cq
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices mishandle session validation, leading to unauthenticated creation, modification, or elimination of users.
[]
null
null
null
null
CVE-2023-27581
github-slug-action vulnerable to arbitrary code execution
github-slug-action is a GitHub Action to expose slug value of GitHub environment variables inside of one's GitHub workflow. Starting in version 4.0.0` and prior to version 4.4.1, this action uses the `github.head_ref` parameter in an insecure way. This vulnerability can be triggered by any user on GitHub on any workflow using the action on pull requests. They just need to create a pull request with a branch name, which can contain the attack payload. This can be used to execute code on the GitHub runners and to exfiltrate any secrets one uses in the CI pipeline. A patched action is available in version 4.4.1. No workaround is available.
[ "cpe:2.3:a:github-slug-action_project:github-slug-action:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2025-3907
Search API Solr - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-046
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Search API Solr allows Cross Site Request Forgery.This issue affects Search API Solr: from 0.0.0 before 4.3.9.
[]
null
4.3
null
null
GHSA-53wj-6m7w-j6mj
MoinMoin Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in MoinMoin 1.5.x through 1.5.8 and 1.6.x before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the login action.
[]
null
null
null
null
GHSA-vw59-wm86-qh74
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is a duplicate of CVE-2024-0193.
[]
null
null
null
null
GHSA-mvhf-cmhg-7m43
Cross-Site Request Forgery (CSRF) vulnerability in HuangYe WuDeng Hacklog Remote Image Autosave allows Cross Site Request Forgery. This issue affects Hacklog Remote Image Autosave: from n/a through 2.1.0.
[]
null
4.3
null
null
CVE-2015-5221
Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
[ "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
RHSA-2015:1905
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 update
AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
GHSA-28m2-22hr-gx8q
Cross-Site Request Forgery (CSRF) vulnerability in P. Roy WP Revisions Manager allows Cross Site Request Forgery.This issue affects WP Revisions Manager: from n/a through 1.0.2.
[]
null
5.4
null
null
CVE-2023-32159
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17765.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2024-40734
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/front-ports/add/.
[ "cpe:2.3:a:netbox:netbox:4.0.3:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-rjrq-hcmw-c76j
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
[]
null
8.3
null
null
CVE-2022-46407
Ericsson Network Manager (ENM), versions prior to 22.2, contains a vulnerability in the REST endpoint “editprofile” where Open Redirect HTTP Header Injection can lead to redirection of the submitted request to domain out of control of ENM deployment. The attacker would need admin/elevated access to exploit the vulnerability
[ "cpe:2.3:a:ericsson:network_manager:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
GHSA-g9ph-r9hc-34r8
Erxes vulnerable to Cross-site Scripting
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in all versions. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
[]
null
6.1
null
null
CVE-2023-31619
An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[ "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*" ]
null
7.5
null
null
GHSA-4x2p-6cr9-jx6r
Cross-site request forgery (CSRF) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to hijack the authentication of administrators for requests that change account privileges via an edit access_permissions action to index.php.
[]
null
null
null
null
CVE-2008-4352
SQL injection vulnerability in inc/pages/viewprofile.php in phpSmartCom 0.2 allows remote attackers to execute arbitrary SQL commands via the uid parameter in a viewprofile action to index.php.
[ "cpe:2.3:a:phpsmartcom:phpsmartcom:0.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
ICSA-20-196-06
Siemens SIMATIC S7-200 SMART CPU Family
The affected devices do not properly handle large numbers of new incoming connections and could crash under certain circumstances.CVE-2020-7584 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
GHSA-wr8h-w969-36m8
GoPistolet vulnerable to Improper Resource Shutdown or Release
A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability.
[]
null
7.5
null
null
GHSA-2vjj-2c9x-r9mp
A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /classes/Master.php?f=save_category. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258874 is the identifier assigned to this vulnerability.
[]
null
6.3
null
null
CVE-2022-45020
Rukovoditel v3.2.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in the component /rukovoditel/index.php?module=users/login. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
[ "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2013-4004
Cross-site scripting (XSS) vulnerability in the Administrative console in IBM WebSphere Application Server (WAS) 8.0 before 8.0.0.7 and 8.5 before 8.5.5.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-gffp-3jpx-85xw
Cross-site scripting (XSS) vulnerability in the Hierarchical Select module 6.x-3.x before 6.x-3.8 for Drupal allows remote authenticated users with administer taxonomy permissions to inject arbitrary web script or HTML via unspecified vectors related to "the vocabulary's help text."
[]
null
null
null
null
CVE-2022-33225
Use after free in Trusted Application Environment
Memory corruption due to use after free in trusted application environment.
[ "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-943v-q963-5fvx
The default configuration in the Red Hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file.
[]
null
null
null
null
CVE-2012-3722
The Sorenson codec in QuickTime in Apple Mac OS X before 10.7.5, and in CoreMedia in iOS before 6, accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with Sorenson encoding.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2023-29381
An issue in Zimbra Collaboration (ZCS) v.8.8.15 and v.9.0 allows a remote attacker to escalate privileges and obtain sensitive information via the password and 2FA parameters.
[ "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2020-13827
phpList before 3.5.4 allows XSS via /lists/admin/user.php and /lists/admin/users.php.
[ "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-6g4v-x78g-q8c5
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted (1) file name or (2) subfolder name that triggers use of unallocated memory as the destination of a copy operation, aka "Windows Filename Parsing Vulnerability."
[]
null
null
null
null
CVE-2020-16934
Microsoft Office Click-to-Run Elevation of Privilege Vulnerability
<p>An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files. An attacker who successfully exploited the vulnerability could elevate privileges.</p> <p>To exploit this vulnerability, an attacker would need to convince a user to open a specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle these files.</p>
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:office_2013_click-to-run:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:*:*:*:click-to-run:*:x86:*", "cpe:2.3:a:microsoft:office:2013:*:*:*:click-to-run:*:x64:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2007-0101
Cross-site request forgery (CSRF) vulnerability in SPINE allows remote attackers to perform unauthorized actions as administrators via unspecified vectors. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:spine:spine:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-22xh-wmr8-5cwg
The User Registration, Login & Landing Pages WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the loader_text parameter found in the ~/includes/templates/landing-page.php file which allows attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.2.7. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[]
null
null
null
null
CVE-2023-33673
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.
[ "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2023-29696
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function version_set.
[ "cpe:2.3:o:h3c:gr-1200w_firmware:minigrw1a0v100r006:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:gr-1200w:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-xq69-757w-jc7m
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuancelinecreate.php, in the batchno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[]
null
7.1
null
null
CVE-2024-23817
Dolibarr Application Home Page HTML injection vulnerability
Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. Version 18.0.4 has a HTML Injection vulnerability in the Home page of the Dolibarr Application. This vulnerability allows an attacker to inject arbitrary HTML tags and manipulate the rendered content in the application's response. Specifically, I was able to successfully inject a new HTML tag into the returned document and, as a result, was able to comment out some part of the Dolibarr App Home page HTML code. This behavior can be exploited to perform various attacks like Cross-Site Scripting (XSS). To remediate the issue, validate and sanitize all user-supplied input, especially within HTML attributes, to prevent HTML injection attacks; and implement proper output encoding when rendering user-provided data to ensure it is treated as plain text rather than executable HTML.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:18.0.4:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2025-24267
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges.
[]
null
7.8
null
null
GHSA-5qrv-7494-cjv2
Buffer overflow in the client cd-key hash in Terminator 3: War of the Machines 1.16 and earlier allows remote attackers to cause a denial of service (application crash) via a long client cd-key hash value, a different vulnerability than CVE-2005-1556.
[]
null
null
null
null
CVE-2020-27347
tmux stack buffer overflow in function input_csi_dispatch_sgr_colon
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
[ "cpe:2.3:a:tmux_project:tmux:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2024-45021
memcg_write_event_control(): fix a user-triggerable oops
In the Linux kernel, the following vulnerability has been resolved: memcg_write_event_control(): fix a user-triggerable oops we are *not* guaranteed that anything past the terminating NUL is mapped (let alone initialized with anything sane).
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2023-28646
App lockout in nextcloud Android app can be bypassed via thirdparty apps
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*" ]
null
4.4
null
null
GHSA-wfj4-9275-fh6p
TablePress prior to version 1.8.1 allows an attacker to conduct XML External Entity (XXE) attacks via unspecified vectors.
[]
null
null
4.3
null
GHSA-825p-7535-q5m8
The Sony Xperia Touch Android device with a build fingerprint of Sony/blanc_windy/blanc_windy:7.0/LOIRE-SMART-BLANC-1.0.0-170530-0834/1:user/dev-keys contains a pre-installed app with a package name of com.sonymobile.android.maintenancetool.testmic app (versionCode=24, versionName=7.0) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record audio to external storage.
[]
null
null
null
null
CVE-2013-3630
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.15:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.16:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.17:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.18:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-pr7q-952h-fq5x
Turtlapp Turtle Note v0.7.2.6 does not filter the <meta> tag during markdown parsing, allowing attackers to execute HTML injection.
[]
null
9
null
null
CVE-2019-4260
IBM Daeja ViewONE Professional, Standard & Virtual 5.0 through 5.0.5 could allow an unauthorized user to download server files resulting in sensitive information disclosure. IBM X-Force ID: 160012.
[ "cpe:2.3:a:ibm:daeja_viewone:*:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:*:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:*:*:*:*:virtual:*:*:*" ]
null
null
5.3
null
GHSA-gqj5-mjv5-j37j
In ReadLittleEndian of raw_bit_reader.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the media server with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147231862
[]
null
null
null
null
GHSA-mhhg-cwfq-wvgg
A BOLA vulnerability in GET, PUT, DELETE /secretaries/{secretaryId} allows a low privileged user to fetch, modify or delete a low privileged user (secretary). This results in unauthorized access and unauthorized data manipulation.
[]
null
9.9
null
null
CVE-2020-6157
Opera Touch for iOS before version 2.4.5 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data.
[ "cpe:2.3:a:opera:opera_touch:*:*:*:*:*:iphone_os:*:*" ]
null
4.3
null
4.3
GHSA-8mgg-gfxm-vwwc
The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute.
[]
null
null
null
null
CVE-2014-0141
Cross-site scripting (XSS) vulnerability in Red Hat Satellite 6.0.3.
[ "cpe:2.3:a:redhat:satellite:6.0.3:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2016-10940
The zm-gallery plugin 1.0 for WordPress has SQL injection via the order parameter.
[ "cpe:2.3:a:zm-gallery_project:zm-gallery:1.0:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
GHSA-r83r-pgp4-qf32
pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the organizationCode parameter at project.php.
[]
null
9.8
null
null
CVE-2005-3024
Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, the (2) thread[forumid] or (3) criteria parameters to thread.php, (4) userid parameter to user.php, the (5) calendarcustomfieldid, (6) calendarid, (7) moderatorid, (8) holidayid, (9) calendarmoderatorid, or (10) calendar[0] parameters to admincalendar.php, (11) the cronid parameter to cronlog.php, (12) user[usergroupid][0] parameter to email.php, (13) help[0] parameter to help.php, the (14) limitnumber or (15) limitstart parameter to user.php, the (16) usertitleid or (17) ids parameters to usertitle.php, (18) rvt[0] parameter to language.php, (19) keep[0] parameter to phrase.php, (20) dostyleid parameter to template.php, (21) thread[forumid] parameter to thread.php, or (22) usertools.php.
[ "cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-11322
An issue was discovered in Motorola CX2 1.01 and M2 1.01. There is a command injection in the function startRmtAssist in hnap, which leads to remote code execution via shell metacharacters in a JSON value.
[ "cpe:2.3:o:motorola:cx2_firmware:1.01:*:*:*:*:*:*:*", "cpe:2.3:h:motorola:cx2:-:*:*:*:*:*:*:*", "cpe:2.3:o:motorola:m2_firmware:1.01:*:*:*:*:*:*:*", "cpe:2.3:h:motorola:m2:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-3wq8-wfw2-w4xm
The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
[]
null
null
7.8
null
CVE-2015-7427
IBM DataPower Gateway appliances with firmware 6.x before 6.0.0.17, 6.0.1.x before 6.0.1.17, 7.x before 7.0.0.10, 7.1.0.x before 7.1.0.7, and 7.2.x before 7.2.0.1 do not set the secure flag for unspecified cookies in an https session, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session.
[ "cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:6.0.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datapower_gateway:7.2.0.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-11262
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing ASCII text string. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
CVE-2017-9207
The iw_get_ui16be function in imagew-util.c:422:24 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image, related to imagew-jpeg.c.
[ "cpe:2.3:a:entropymine:imageworsener:1.3.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
ICSMA-21-215-01
Swisslog Healthcare Translogic PTS
User and root accounts have hardcoded passwords that can be accessed remotely on the Nexus Control Panel. These accounts are enabled by default and cannot be turned off by native configuration of the system.CVE-2021-37163 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A user logged in using the default credentials can gain root access to the device, which allows permissions for all the functionalities of the device.CVE-2021-37167 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A buffer overflow allows an attacker to overwrite an internal queue data structure, which could allow remote code execution.CVE-2021-37161 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A buffer overflow allows an attacker to overwrite an internal queue data structure, which could allow remote code execution.CVE-2021-37162 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A specially crafted message to the HMI may cause an overflow, which could allow remote code execution.CVE-2021-37165 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Received data can be copied to a stack buffer, resulting in an overflow.CVE-2021-37164 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The method used to bind a local service to ports on device interfaces may allow the connection to be hijacked by an external attacker.CVE-2021-37166 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). There is no file validation during an upload for an update.CVE-2021-37160 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
[]
null
null
7.5
null
CVE-2013-0385
Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
null
6.6
CVE-2022-21330
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-2017-8974
A Local Authentication Restriction Bypass vulnerability in HPE NonStop Server version L-Series: T6533L01 through T6533L01^ADN; J-Series and H-series: T6533H02 through T6533H04^ADF and T6533H05 through T6533H05^ADL was found.
[ "cpe:2.3:a:hp:nonstop_server_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:nonstop_server:-:*:*:*:*:*:*:*" ]
null
null
4.4
3.6
GHSA-8j75-9989-vx3r
In the Linux kernel, the following vulnerability has been resolved:tcp: Fix a data-race around sysctl_tcp_notsent_lowat.While reading sysctl_tcp_notsent_lowat, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
[]
null
4.7
null
null
PYSEC-2020-8
null
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
[]
null
null
null
null
GHSA-7j6q-f3g4-6f5q
Compuware DriverStudio Remote Control service (DSRsvc.exe) 2.7 and 3.0 beta 2 allows remote attackers to bypass authentication via a null session.
[]
null
null
null
null
GHSA-7686-g7vr-w687
Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2020-29364
In NetArt News Lister 1.0.0, the news headlines vulnerable to stored xss attacks. Attackers can inject codes in news titles.
[ "cpe:2.3:a:netartmedia:news_lister:1.0.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
RHSA-2013:0996
Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support 1-Month Notice
This is the 1-Month notification for the retirement of Red Hat Enterprise Linux 5.6 Extended Update Support (EUS).
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
GHSA-v777-6v7p-3jjm
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in weDevs WP ERP plugin <= 1.12.3 versions.
[]
null
7.1
null
null
GHSA-3f6w-7976-54vq
An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
[]
null
8.8
null
null
CVE-2023-35694
In DMPixelLogger_ProcessDmCommand of DMPixelLogger.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2013-3084
Multiple cross-site scripting (XSS) vulnerabilities in Belkin Model F5D8236-4 v2 router allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:h:belkin:f5d8236-4:v2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-79c6-5cw9-rpwc
The issue was addressed with improved checks. This issue is fixed in visionOS 2, macOS Sequoia 15. A malicious app with root privileges may be able to modify the contents of system files.
[]
null
6
null
null
GHSA-vxpr-pv2v-9c9w
VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
[]
null
null
null
null
CVE-2024-29211
A race condition in Ivanti Secure Access Client before version 22.7R4 allows a local authenticated attacker to modify sensitive configuration files.
[ "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:secure_access_client:22.7:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:secure_access_client:22.7:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:secure_access_client:22.7:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:secure_access_client:22.7:r3:*:*:*:*:*:*" ]
null
null
7.1
null
CVE-2023-26613
An OS command injection vulnerability in D-Link DIR-823G firmware version 1.02B05 allows unauthorized attackers to execute arbitrary operating system commands via a crafted GET request to EXCU_SHELL.
[ "cpe:2.3:h:d-link:dir-823g:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-823g_firmware:1.02b05:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*" ]
null
9.8
null
null