id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-32666 | In Wi-Fi, there is a possible low throughput due to misrepresentation of critical information. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220829014; Issue ID: GN20220829014. | [
"cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7603_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7613_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7615_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7622_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7628_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7629_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7915_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7916_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7981_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt7986_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:mt8365_firmware:7.6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-p5f6-24c7-fw7h | SQL injection vulnerability in admin.asp in ASPTicker 1.0 allows remote attackers to execute arbitrary SQL commands via the PATH_INFO, possibly related to the Password parameter. | []
| null | null | null | null |
|
GHSA-g266-3crh-h7gj | ldoce Gem Arbitrary Command Execution | `lib/ldoce/word.rb` in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name. | []
| null | null | null | null |
GHSA-hg7h-2pr6-wvjf | Windows DNS Server Information Disclosure Vulnerability. | []
| null | 6.5 | null | null |
|
CVE-2022-22784 | Improper XML Parsing in Zoom Client for Meetings | The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. This can allow a malicious user to break out of the current XMPP message context and create a new message context to have the receiving users client perform a variety of actions.This issue could be used in a more sophisticated attack to forge XMPP messages from the server. | [
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*"
]
| null | 8.1 | null | null |
GHSA-h6pp-v4j6-w76c | Password stored in plain text by Dynamic Extended Choice Parameter Plugin | Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | []
| null | 4.3 | null | null |
CVE-2019-16317 | In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerability than CVE-2019-10867 and CVE-2019-16318. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.5 |
|
CVE-2017-16330 | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event_alarm, at 0x9d01eb8c, the value for the `s_event_group` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*"
]
| null | null | 8.5 | null |
|
GHSA-558v-8jp5-w94h | A malicious website could execute code remotely in Sophos Connect Client before version 2.1. | []
| null | 8.8 | null | null |
|
CVE-2025-21822 | ptp: vmclock: Set driver data before its usage | In the Linux kernel, the following vulnerability has been resolved:
ptp: vmclock: Set driver data before its usage
If vmclock_ptp_register() fails during probing, vmclock_remove() is
called to clean up the ptp clock and misc device.
It uses dev_get_drvdata() to access the vmclock state.
However the driver data is not yet set at this point.
Assign the driver data earlier. | []
| null | null | null | null |
GHSA-3w5m-mfmj-cpcf | Missing Authorization vulnerability in Termly Cookie Consent.This issue affects Cookie Consent: from n/a through 3.2. | []
| null | 5.3 | null | null |
|
CVE-2021-21239 | Open default xmlsec1 key-type preference | PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ensure that a signed SAML document is correctly signed. The default CryptoBackendXmlSec1 backend is using the xmlsec1 binary to verify the signature of signed SAML documents, but by default xmlsec1 accepts any type of key found within the given document. xmlsec1 needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature. This is fixed in PySAML2 6.5.0. | [
"cpe:2.3:a:pysaml2_project:pysaml2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
RHSA-2016:0428 | Red Hat Security Advisory: libssh2 security update | libssh2: bits/bytes confusion resulting in truncated Diffie-Hellman secret length | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
GHSA-74gh-5j33-vg4w | MantisBT allows XSS on the Edit Filter page via crafted filter name | An issue was discovered in manage_filter_edit_page.php in MantisBT 2.x through 2.15.0. A cross-site scripting (XSS) vulnerability in the Edit Filter page allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name (e.g., 'foobar" onclick="alert(1)'). | []
| null | null | 6.1 | null |
GHSA-8qhw-338v-3v5w | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
| null | null | null | null |
|
GHSA-7gg8-gg4j-88c2 | Multiple cross-site scripting (XSS) vulnerabilities in membrepass 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) recherche parameter in recherchemembre.php and the (2) email parameter in test.php. | []
| null | null | null | null |
|
GHSA-8pj8-c4m2-fgh7 | RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php. | []
| null | 9.8 | null | null |
|
GHSA-c43m-486j-j32p | In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications. | []
| null | 6.5 | null | null |
|
GHSA-8732-pcm5-gc4j | A vulnerability was found in PHPGurukul Student Record System 3.20. It has been declared as critical. This vulnerability affects unknown code of the file /add-course.php. The manipulation of the argument course-short leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | null | null |
|
CVE-2018-17983 | cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry. | [
"cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*"
]
| null | null | 9.1 | 6.4 |
|
CVE-2023-39201 | Untrusted search path in CleanZoom before file date 07/24/2023 may allow a privileged user to conduct an escalation of privilege via local access. | [
"cpe:2.3:a:zoom:cleanzoom:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-fphj-3v4m-45m5 | Cross-site scripting (XSS) vulnerability in Websense TRITON AP-EMAIL before 8.0.0 and V-Series 7.7 appliances allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
GHSA-p9pf-5c8c-756m | Format string vulnerability in Fortinet FortiClient 3.0.614, and possibly earlier, allows local users to execute arbitrary code via format string specifiers in the VPN connection name. | []
| null | null | null | null |
|
CVE-2021-39695 | In createOrUpdate of BasePermission.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-209607944 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
CVE-2023-1216 | Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-4gpg-x7c9-xm4v | A vulnerability, which was classified as critical, was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. Affected is an unknown function of the file /edit-phlebotomist.php. The manipulation of the argument mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | null | null |
|
CVE-2019-15939 | An issue was discovered in OpenCV 4.1.0. There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp. | [
"cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 5.9 | null | 4.3 |
|
CVE-2011-3269 | Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut. | [
"cpe:2.3:o:lexmark:x950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x952_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x954_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x940e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x940e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x945e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x945e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x925de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x925de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x862_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x862:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x864_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x864:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x854_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x854:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x792de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x792de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x782e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x782e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x772e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x772e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x736_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x736:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x738_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x738:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x644_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x644:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x646_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x646:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x548de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x548de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x544_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x544:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x422_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x422:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x36x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x36x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x34x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x34x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x264_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x264:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:w840_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t656_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t656:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t652_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t644_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t644:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e462:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e342_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e332n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e332n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e234_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e234n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e234n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e240n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e240n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e238_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e232_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e232:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c935dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c935dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c925de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c925de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c792e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c792e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c789_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c789:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c782_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c782:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c772_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c772:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c762_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c762:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c524_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c524:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:25xxn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:25xxn:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-x7cg-3x6g-hghf | A vulnerability was found in jack0240 魏 bskms 蓝天幼儿园管理系统 up to dffe6640b5b54d8e29da6f060e0493fea74b3fad. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sa/addUser of the component User Creation Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. | []
| 6.9 | 7.3 | null | null |
|
CVE-2009-3031 | Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument. | [
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:*:sp1:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:7.0:sp3:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-7cx3-pgfh-r6h3 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | []
| null | null | null | null |
|
RHSA-2015:0837 | Red Hat Security Advisory: openstack-glance security and bug fix update | openstack-glance: user storage quota bypass | [
"cpe:/a:redhat:openstack:5::el7"
]
| null | null | null | null |
GHSA-8h3j-g9f5-qfm7 | Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: API). Supported versions that are affected are ECC: 8, 9 and 10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | []
| null | 6.5 | null | null |
|
GHSA-hf54-fq2m-p9v6 | dotmesh arbitrary file read and/or write | Dotmesh is a git-like command-line interface for capturing, organizing and sharing application states. In versions 0.8.1 and prior, the unsafe handling of symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations outside the designated target folder. The routine `untarFile` attempts to guard against creating symbolic links that point outside the directory a tar archive is extracted to. However, a malicious tarball first linking `subdir/parent` to `..` (allowed, because `subdir/..` falls within the archive root) and then linking `subdir/parent/escapes` to `..` results in a symbolic link pointing to the tarball’s parent directory, contrary to the routine’s goals. This issue may lead to arbitrary file write (with same permissions as the program running the unpack operation) if the attacker can control the archive file. Additionally, if the attacker has read access to the unpacked files, they may be able to read arbitrary system files the parent process has permissions to read. As of time of publication, no patch for this issue is available. | []
| null | 8.1 | null | null |
CVE-2019-4594 | IBM QRadar 7.3.0 to 7.3.3 Patch 2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-ForceID: 167810. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | null | 5.9 | null |
|
CVE-2007-6016 | Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control. | [
"cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2024-57513 | A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4. | []
| null | 6.5 | null | null |
|
CVE-2005-1679 | Stack-based buffer overflow in the error directive in picasm 1.12b and earlier allows attackers to execute arbitrary code via a long error message. | [
"cpe:2.3:a:timo_rossi:picasm:*:*:*:*:*:*:*:*"
]
| null | null | null | 5.1 |
|
CVE-2023-52045 | Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-2f58-3p8j-4mx4 | Improper access control in the CI/CD cache mechanism in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows a malicious actor with Developer privileges to perform cache poisoning leading to arbitrary code execution in protected branches | []
| null | 8.8 | null | null |
|
GHSA-w3ph-xq76-6prc | The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers. | []
| null | null | null | null |
|
CVE-2010-0741 | The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO). | [
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*",
"cpe:2.3:a:kvm_qumranet:kvm:83:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
RHSA-2024:7861 | Red Hat Security Advisory: Apicurio Registry (container images) release and security update [ 2.6.5 GA ] | apache-avro: Schema parsing may trigger Remote Code Execution (RCE) | [
"cpe:/a:redhat:apicurio_registry:2.6"
]
| null | 8.8 | null | null |
ICSA-21-250-02 | Hitachi ABB Power Grids System Data Manager | The application does not encrypt backup files. A local operating system user can modify backup files, which may allow an attacker to overwrite system configuration files and gain privileges.CVE-2021-35526 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L). | []
| null | null | 6.3 | null |
CVE-2024-4373 | Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) <= 3.5.3 - Authenticated (Contributor+) Stored Cross-site Scriping via 'Sina Particle Layer' | The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Sina Particle Layer widget in all versions up to, and including, 3.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
CVE-2009-0708 | Multiple cross-site request forgery (CSRF) vulnerabilities in SemanticScuttle before 0.91 allow remote attackers to (1) hijack the authentication of administrators via unknown vectors or (2) hijack the authentication of arbitrary users via vectors involving the profile page. | [
"cpe:2.3:a:semanticscuttle:semanticscuttle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.89:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2021-0233 | Junos OS: ACX500 Series, ACX4000 Series: Denial of Service due to FFEB crash while processing high rate of specific packets. | A vulnerability in Juniper Networks Junos OS ACX500 Series, ACX4000 Series, may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a Forwarding Engine Board (FFEB) crash. Continued receipt of these packets will sustain the Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on ACX500 Series, ACX4000 Series: 17.4 versions prior to 17.4R3-S2. | [
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
CVE-2024-39357 | A stack-based buffer overflow vulnerability exists in the wireless.cgi SetName() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | []
| null | 9.1 | null | null |
|
GHSA-2fm2-p76r-3mv9 | The sensitive information of webcam device is not properly protected. Remote attackers can unauthentically grant administrator’s credential and further control the devices. | []
| null | 9.8 | null | null |
|
GHSA-j59w-vmvh-rmmh | hhvm before 3.12.11 has a use-after-free in the serialize_memoize_param() and ResourceBundle::__construct() functions. | []
| null | null | null | null |
|
CVE-2006-1920 | SQL injection vulnerability in index.php in PMTool 1.2.2 allows remote attackers to execute arbitrary SQL commands via the order parameter in the include files (1) user.inc.php, (2) customer.inc.php, and (3) project.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:pmtool:pmtool:1.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2014-5098 | Cross-site scripting (XSS) vulnerability in the Search module before 1.2.2 in Jamroom allows remote attackers to inject arbitrary web script or HTML via the query string to search/results/. | [
"cpe:2.3:a:jamroom:search_module:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2019-5478 | A weakness was found in Encrypt Only boot mode in Zynq UltraScale+ devices. This could lead to an adversary being able to modify the control fields of the boot image leading to an incorrect secure boot behavior. | [
"cpe:2.3:o:amd:zu11eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu11eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu15eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu15eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu17eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu17eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu19eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu19eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu1cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu1cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu1eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu1eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu21dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu21dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu25dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu25dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu27dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu27dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu28dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu28dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu29dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu29dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu2cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu2cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu2eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu2eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu39dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu39dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu3cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu3cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu3eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu3eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu3tcg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu3tcg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu3teg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu3teg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu42dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu42dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu43dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu43dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu46dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu46dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu47dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu47dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu48dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu48dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu49dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu49dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu4cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu4cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu4eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu4eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu4ev_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu4ev:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu5cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu5cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu5eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu5eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu5ev_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu5ev:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu63dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu63dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu64dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu64dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu65dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu65dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu67dr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu67dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu6cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu6cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu6eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu6eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu7cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu7cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu7eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu7eg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu7ev_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu7ev:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu9cg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu9cg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:zu9eg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:zu9eg:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
cisco-sa-dnac-info-disc-8QEynKEj | Cisco DNA Center Information Disclosure Vulnerability | A vulnerability in the audit log of Cisco DNA Center could allow an authenticated, local attacker to view sensitive information in clear text.
This vulnerability is due to the unsecured logging of sensitive information on an affected system. An attacker with administrative privileges could exploit this vulnerability by accessing the audit logs through the CLI. A successful exploit could allow the attacker to retrieve sensitive information that includes user credentials.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | 4.4 | null | null |
CVE-2018-14523 | An issue was discovered in aubio 0.4.6. A buffer over-read can occur in new_aubio_pitchyinfft in pitch/pitchyinfft.c, as demonstrated by aubionotes. | [
"cpe:2.3:a:aubio:aubio:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:15.0:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
RHSA-2021:3176 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
]
| null | 2.8 | 6.5 | null |
GHSA-wh4h-v3f2-r2pp | Uncontrolled Memory Consumption in Django | Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the `django.utils.numberformat.format()` function. | []
| 8.7 | null | 7.5 | null |
GHSA-vrp4-j3rg-w647 | /usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option. | []
| null | null | null | null |
|
GHSA-rjgm-pr7r-qv2j | ColorSync on Mac OS X 10.3.7 and 10.3.8 allows attackers to execute arbitrary code via malformed ICC color profiles that modify the heap. | []
| null | null | null | null |
|
CVE-2022-4043 | WP Custom Admin Interface < 7.29 - Admin+ PHP Object Injection | The WP Custom Admin Interface WordPress plugin before 7.29 unserialize user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present. | [
"cpe:2.3:a:wp_custom_admin_interface_project:wp_custom_admin_interface:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
GHSA-px7c-6w6c-rwj2 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv. | []
| null | 9.8 | null | null |
|
CVE-2009-2679 | Unspecified vulnerability in bootpd in HP HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause a denial of service via unknown attack vectors. | [
"cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2008-4173 | SQL injection vulnerability in ProArcadeScript 1.3 allows remote attackers to execute arbitrary SQL commands via the random parameter to the default URI. | [
"cpe:2.3:a:proarcadescript:proarcadescript:1.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-38498 | Discourse vulnerable to DoS via defer queue | Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a malicious user can prevent the defer queue from proceeding promptly on sites hosted in the same multisite installation. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability. Users of multisite configurations should upgrade. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta6:*:*:beta:*:*:*"
]
| null | 4.3 | null | null |
GHSA-p679-56p3-wphw | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. | []
| null | 7.5 | null | null |
|
RHSA-2022:1213 | Red Hat Security Advisory: kernel security update | kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
]
| null | 7.1 | null | null |
PYSEC-2021-345 | null | The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory. | []
| null | null | null | null |
GHSA-vm5m-fjfx-3rjq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moch Amir Google Drive WP Media allows Stored XSS. This issue affects Google Drive WP Media: from n/a through 2.4.4. | []
| null | 6.5 | null | null |
|
GHSA-qp2p-3fr2-8j54 | Predictable seed generation in the security access mechanism of UDS in the Blind Spot Protection Sensor ECU in Nissan Altima (2022) allows attackers to predict the requested seeds and bypass security controls via repeated ECU resets and seed requests. | []
| 5.3 | 7.5 | null | null |
|
CVE-2025-21535 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2022-27139 | An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. NOTE: Vendor states that as outlined in Ghost's security documentation, upload of SVGs is only possible by trusted authenticated users. The uploading of SVG files to Ghost does not represent a remote code execution vulnerability. SVGs are not executable on the server, and may only execute javascript in a client's browser - this is expected and intentional functionality | [
"cpe:2.3:a:ghost:ghost:4.39.0:*:*:*:*:node.js:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2015-6624 | System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23999740. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2022-22159 | Junos OS: An attacker sending crafted packets can cause a traffic and CPU Denial of Service (DoS). | A vulnerability in the NETISR network queue functionality of Juniper Networks Junos OS kernel allows an attacker to cause a Denial of Service (DoS) by sending crafted genuine packets to a device. During an attack, the routing protocol daemon (rpd) CPU may reach 100% utilization, yet FPC CPUs forwarding traffic will operate normally. This attack occurs when the attackers' packets are sent over an IPv4 unicast routing equal-cost multi-path (ECMP) unilist selection. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. An indicator of compromise may be to monitor NETISR drops in the network with the assistance of JTAC. Please contact JTAC for technical support for further guidance. This issue affects: Juniper Networks Junos OS 17.3 version 17.3R3-S9 and later versions prior to 17.3R3-S12; 17.4 version 17.4R3-S3 and later versions prior to 17.4R3-S5; 18.1 version 18.1R3-S11 and later versions prior to 18.1R3-S13; 18.2 version 18.2R3-S6 and later versions; 18.3 version 18.3R3-S4 and later versions prior to 18.3R3-S5; 18.4 version 18.4R3-S5 and later versions prior to 18.4R3-S9; 19.1 version 19.1R3-S3 and later versions prior to 19.1R3-S7. This issue does not affect Juniper Networks Junos OS versions prior to 17.3R3-S9. This issue does not affect Juniper Networks Junos OS Evolved. | [
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
CVE-2010-1097 | include/userlogin.class.php in DeDeCMS 5.5 GBK, when session.auto_start is enabled, allows remote attackers to bypass authentication and gain administrative access via a value of 1 for the _SESSION[dede_admin_id] parameter, as demonstrated by a request to uploads/include/dialog/select_soft_post.php. | [
"cpe:2.3:a:dedecms:dedecms:5.5:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
RHSA-2013:0187 | Red Hat Security Advisory: JBoss Operations Network 3.1.2 update | GWT: unknown XSS flaw | [
"cpe:/a:redhat:jboss_operations_network:3.1.2"
]
| null | null | null | null |
RHSA-2023:4892 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.12 security and bug fix update | golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results | [
"cpe:/a:redhat:rhmt:1.7::el8"
]
| null | 5.3 | null | null |
GHSA-fhp2-3grf-9hfr | NCH Axon PBX v2.22 and earlier allows path traversal for file deletion via the logdelete?file=/.. substring. | []
| null | null | null | null |
|
GHSA-8m2g-7w6w-g4h4 | Chevereto Free before 1.0.13 has XSS. | []
| null | null | 5.4 | null |
|
GHSA-mpmc-v776-vcmf | A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions. | []
| null | null | null | null |
|
CVE-2016-6474 | A vulnerability in the implementation of X.509 Version 3 for SSH authentication functionality in Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication on an affected system. More Information: CSCuv89417. Known Affected Releases: 15.5(2.25)T. Known Fixed Releases: 15.2(4)E1 15.2(4)E2 15.2(4)E3 15.2(4)EA4 15.2(4.0r)EB 15.2(4.1.27)EB 15.2(4.4.2)EA4 15.2(4.7.1)EC 15.2(4.7.2)EC 15.2(5.1.1)E 15.2(5.5.63)E 15.2(5.5.64)E 15.4(1)IA1.80 15.5(3)M1.1 15.5(3)M2 15.5(3)S1.4 15.5(3)S2 15.6(0.22)S0.12 15.6(1)T0.1 15.6(1)T1 15.6(1.15)T 15.6(1.17)S0.7 15.6(1.17)SP 15.6(1.22.1a)T0 15.6(2)S 15.6(2)SP 16.1(1.24) 16.1.2 16.2(0.247) 16.3(0.11) 3.8(1)E Denali-16.1.2. | [
"cpe:2.3:o:cisco:ios:15.5\\(2.25\\)t:*:*:*:*:*:*:*"
]
| null | null | 7.3 | 5.8 |
|
GHSA-cgfm-mgjw-2f4q | An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exists in ladder/stats.php via the GET sort_direction parameter. | []
| null | null | 9.8 | null |
|
GHSA-qf92-3g6p-pvfg | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
| null | null | null | null |
|
CVE-2018-9444 | In ih264d_video_decode of ih264d_api.c there is a possible resource exhaustion due to an infinite loop. This could lead to remote temporary device denial of service (remote hang or reboot) with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android ID: A-63521984. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 7.1 |
|
GHSA-pjgj-h64x-5jpg | Unspecified vulnerability in the Oracle One-to-One Fulfillment component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality via vectors related to Content Manager. | []
| null | null | 5.3 | null |
|
CVE-2018-4969 | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-wr66-px74-574m | The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 7.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the account_settings_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. | []
| null | 9.8 | null | null |
|
CVE-2021-40610 | Emlog Pro v 1.0.4 cross-site scripting (XSS) in Emlog Pro background management. | [
"cpe:2.3:a:emlog_pro_project:emlog_pro:1.0.4:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2018-18527 | OwnTicket 2018-05-23 allows SQL Injection via the showTicketId or editTicketStatusId parameter. | [
"cpe:2.3:a:owndms:ownticket:1.0:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2015-1316 | Juju Joyent provider uploads user's private ssh key by default | Juju Core's Joyent provider before version 1.25.5 uploads the user's private ssh key. | [
"cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*"
]
| null | null | 6.4 | null |
CVE-2018-7997 | Eramba e1.0.6.033 has Reflected XSS on the Error page of the CSV file inclusion tab of the /importTool/preview URI, with a CSV file polluted with malicious JavaScript. | [
"cpe:2.3:a:eramba:eramba:e1.0.6.033:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2002-1762 | Microsoft Baseline Security Analyzer (MBSA) 1.0 stores security scans in a known location C:\Documents and Settings\username\SecurityScans in plaintext, which could allow remote attackers to obtain sensitive information about the system via malicious active content such as ActiveX controls or Java. | [
"cpe:2.3:a:microsoft:baseline_security_analyzer:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-xc7w-hcqx-q2x3 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Oliver Schlöbe Simple Yearly Archive plugin <= 2.1.8 versions. | []
| null | 5.9 | null | null |
|
GHSA-cww5-rhpx-mg2j | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, macOS Monterey 12.6. A user may be able to view restricted content from the lock screen. | []
| null | 5.5 | null | null |
|
CVE-2022-36967 | In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. This would allow the attacker to execute code within the context of the victim's browser. | [
"cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-2867-6rrm-38gr | Laravel Cookie serialization vulnerability | Laravel 5.6.30 is a security release of Laravel and is recommended as an immediate upgrade for all users. Laravel 5.6.30 also contains a breaking change to cookie encryption and serialization logic. Refer to [laravel advisory](https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30) for more details and read the notes carefully when upgrading your application. | []
| null | null | null | null |
CVE-2017-5802 | A Remote Gain Privileged Access vulnerability in HPE Vertica Analytics Platform version v4.1 and later was found. | [
"cpe:2.3:a:hp:vertica:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2021-33654 | When performing the initialization operation of the Split operator, if a dimension in the input shape is 0, it will cause a division by 0 exception. | [
"cpe:2.3:a:mindspore:mindspore:*:*:*:*:*:openeuler:*:*",
"cpe:2.3:a:mindspore:mindspore:0.7.0:beta:*:*:*:openeuler:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2024-33914 | WordPress Exclusive Addons for Elementor plugin <= 2.6.9.1 - Broken Access Control on Post Duplication vulnerability | Missing Authorization vulnerability in Exclusive Addons Exclusive Addons Elementor.This issue affects Exclusive Addons Elementor: from n/a through 2.6.9.1.
| []
| null | 4.3 | null | null |
RHSA-2005:612 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
CVE-2023-35713 | Ashlar-Vellum Cobalt XE File Parsing Uninitialized Memory Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt XE File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XE files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20201. | [
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.