id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-jqj3-fh4v-x7hj
Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service that could allow an attacker to bypass authentication measures and gain controls over utilities within the products.
[]
9.3
null
null
null
GHSA-p83g-m5q3-j96c
Multiple SQL injection vulnerabilities in NewLife Blogger before 3.3.1 allow remote attackers to execute arbitrary SQL commands via unknown attack vectors.
[]
null
null
null
null
CVE-2018-1000607
A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.
[ "cpe:2.3:a:jenkins:fortify_cloudscan:*:*:*:*:*:jenkins:*:." ]
null
null
6.5
4
GHSA-fx83-p5c7-qq9h
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
[]
null
null
null
null
CVE-2021-27494
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*", "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2010-4167
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.1-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.1-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.5-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.6-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.7-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.8-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.9-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.0-11:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.1-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.2-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.3-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.4-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.4-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.4-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.4-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.5-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.6-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.7-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.8-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.4.9-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.0-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.1-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.2-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.3-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.4-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.5-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.6-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.7-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.8-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.5.9-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.0-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.1-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.2-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.3-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.4-10:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.5-1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.5-2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.6.5-3:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2022-49800
tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() test_gen_synth_cmd() only free buf in fail path, hence buf will leak when there is no failure. Add kfree(buf) to prevent the memleak. The same reason and solution in test_empty_synth_event(). unreferenced object 0xffff8881127de000 (size 2048): comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s) hex dump (first 32 bytes): 20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_ backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<0000000039eb1cf5>] 0xffffffffa00083cd [<000000000e8c3bc8>] 0xffffffffa00086ba [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd unreferenced object 0xffff8881127df000 (size 2048): comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s) hex dump (first 32 bytes): 20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes 74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<00000000d4db9a3d>] 0xffffffffa0008071 [<00000000c31354a5>] 0xffffffffa00086ce [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[]
null
null
null
null
CVE-2012-0814
The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
[ "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2011-1540
Unspecified vulnerability in HP System Management Homepage (SMH) before 6.3 allows remote authenticated users to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.0-12:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.1-14:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.2-2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-gmvp-5rf9-mxcm
OpenStack Identity (Keystone) Multiple vulnerabilities in revocation events
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token.
[]
7.1
6.5
null
null
RHSA-2010:0291
Red Hat Security Advisory: gfs-kmod security, bug fix and enhancement update
kernel: bug in GFS/GFS2 locking code leads to dos
[ "cpe:/a:redhat:rhel_cluster_storage:5" ]
null
null
null
null
GHSA-f7r2-wm9j-6x59
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.
[]
null
null
6.5
null
CVE-2024-37649
Insecure Permissions vulnerability in SecureSTATION v.2.5.5.3116-S50-SMA-B20160811A and before allows a physically proximate attacker to obtain sensitive information via the modification of user credentials.
[]
null
4.6
null
null
CVE-2008-1072
The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug.
[ "cpe:2.3:a:wireshark:wireshark:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*" ]
null
null
null
4.7
GHSA-547h-p6jv-c3g9
A session fixation vulnerability in the B. Braun Melsungen AG SpaceCom administrative interface Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 allows remote attackers to hijack web sessions and escalate privileges.
[]
null
8.1
null
null
CVE-2019-1436
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1440.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-2jjm-6whx-p8w4
filp whoops Cross-site Scripting vulnerability
The dump function in `Util/TemplateHelper.php` in filp whoops before 2.1.13 has a Cross-site Scripting vulnerability.
[]
null
null
6.1
null
GHSA-4mfx-6h3r-r7mp
A cross-site scripting (XSS) vulnerability in the openSelectManyUserPage?orgid interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[]
null
4.8
null
null
CVE-2001-1505
tinc 1.0pre3 and 1.0pre4 allows remote attackers to inject data into user sessions by sniffing and replaying packets.
[ "cpe:2.3:a:tinc:tinc:1.0pre3:*:*:*:*:*:*:*", "cpe:2.3:a:tinc:tinc:1.0pre4:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-f2mp-8fgg-7465
Vertical Privilege Escalation in KONGA 0.14.9 allows attackers to higher privilege users to full administration access. The attack vector is a crafted condition, as demonstrated by the /api/user/{ID} at ADMIN parameter.
[]
null
8.8
null
null
GHSA-83ff-cpf7-ghwf
A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration.
[]
null
8.1
null
null
CVE-2014-9728
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
4.9
GHSA-786q-qmm3-7c5g
IBM Campaign 9.1.2 and 10.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162172.
[]
null
4.3
null
null
GHSA-3j5x-wxpv-2qp4
In the ihevcd_decode function of ihevcd_decode.c, there is an infinite loop due to an incomplete frame error. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380403.
[]
null
null
7.5
null
GHSA-m4hr-2hrx-m38c
mirror --script in lftp before 3.5.9 does not properly quote shell metacharacters, which might allow remote user-assisted attackers to execute shell commands via a malicious script. NOTE: it is not clear whether this issue crosses security boundaries, since the script already supports commands such as "get" which could overwrite executable files.
[]
null
null
null
null
CVE-2018-7432
Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request.
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:light:*:*:*", "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ]
null
null
7.5
5
GHSA-w7hr-v9m4-rf7p
The triggers in Oracle 9i and 10g allow local users to gain privileges by using a sequence of partially privileged actions: using CCBKAPPLROWTRIG or EXEC_CBK_FN_DML to add arbitrary functions to the SDO_CMT_DBK_FN_TABLE and SDO_CMT_CBK_DML_TABLE, then performing a DELETE on the SDO_TXN_IDX_INSERTS table, which causes the SDO_CMT_CBK_TRIG trigger to execute the user-supplied functions.
[]
null
null
null
null
CVE-2010-0176
Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
[ "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-c787-p47f-ccwq
Deserialization of Untrusted Data vulnerability in Phan An AJAX Random Posts allows Object Injection.This issue affects AJAX Random Posts: from n/a through 0.3.3.
[]
null
9.8
null
null
GHSA-qxg7-cvq5-m7w7
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions like subscribers, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-4g7j-2h92-xxp4
Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
[]
null
null
null
null
CVE-2020-15005
In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
3.1
null
2.6
CVE-2022-21325
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
2.9
null
null
CVE-2017-14625
ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
9.8
7.5
CVE-2023-1194
Use-after-free in parse_lease_state()
An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9" ]
null
7.1
null
null
CVE-2020-10228
A file upload vulnerability in vtecrm vtenext 19 CE allows authenticated users to upload files with a .pht extension, resulting in remote code execution.
[ "cpe:2.3:a:vtenext:vtenext:19:*:*:*:community:*:*:*" ]
null
8.8
null
6.5
CVE-1999-1201
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
[ "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*" ]
null
null
null
5
CVE-2025-2702
Softwin WMX3 ImageAdd.ashx ImageAdd unrestricted upload
A vulnerability, which was classified as critical, has been found in Softwin WMX3 3.1. This issue affects the function ImageAdd of the file /ImageAdd.ashx. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
GHSA-8hcc-v45g-cjg4
Cross-site request forgery (CSRF) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
8.8
null
GHSA-7784-w778-5qhf
Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in WP Chill Brilliance theme <= 1.3.1 versions.
[]
null
5.4
null
null
CVE-2018-21257
An issue was discovered in Mattermost Server before 5.1. It allows attackers to bypass intended access restrictions (for setting a channel header) via the Channel header slash command API.
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
ICSA-18-114-03
Advantech WebAccess HMI Designer
Heap-based buffer overflow vulnerabilities caused by processing specially crafted .pm3 files may allow remote code execution.CVE-2018-8833 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Double free vulnerabilities caused by processing specially crafted .pm3 files may allow remote code execution.CVE-2018-8835 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Processing specially crafted .pm3 files may cause the system to write outside the intended buffer area and may allow remote code execution.CVE-2018-8837 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).
[]
null
null
6.3
null
GHSA-9w5h-w86f-p4cw
Reset to default settings may occur in Lenovo ThinkServer TSM RD350, RD450, RD550, RD650, TD350 during a prolonged broadcast storm in TSM versions earlier than 3.77.
[]
null
null
7.5
null
GHSA-hq5r-m79m-vm9v
lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts.
[]
null
7.5
null
null
GHSA-w7r5-4c54-wgj2
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b03b5.
[]
null
6.5
null
null
GHSA-3749-62f5-h6xh
Missing Authorization vulnerability in Fatcat Apps Landing Page Cat.This issue affects Landing Page Cat: from n/a through 1.7.4.
[]
null
5.4
null
null
GHSA-r894-5r7v-7rx3
easy-scrypt Observable Timing Discrepancy vulnerability
A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function `VerifyPassphrase` of the file `scrypt.go`. The manipulation leads to observable timing discrepancy. Upgrading to version 1.0.0 can address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596.
[]
null
5.3
null
null
CVE-2002-0491
admin.php in AlGuest 1.0 guestbook checks for the existence of the admin cookie to authenticate the AlGuest administrator, which allows remote attackers to bypass the authentication and gain privileges by setting the admin cookie to an arbitrary value.
[ "cpe:2.3:a:alguest:alguest:1.0:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2008-5113
WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.
[ "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2025-21089
Arkcompiler Ets Runtime has an out-of-bounds read vulnerability
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
[]
null
3.3
null
null
GHSA-9v9c-ff35-5vwx
The Project issue tracking module before 4.7.x-1.3, 4.7.x-2.* before 4.7.x-2.3, and 5 before 5.x-0.2-beta for Drupal allows remote authenticated users, with "access project issues" permission, to read the contents of a private node via a URL with a modified node identifier.
[]
null
null
null
null
CVE-2009-0419
Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-4033.
[ "cpe:2.3:a:microsoft:xml_core_services:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rc63-j49f-5vh2
mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\n.
[]
null
null
null
null
GHSA-wxvf-839f-jqmh
Craft CMS Cross site Scripting vulnerability
Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via `src/helpers/Cp.php`.
[]
null
5.4
null
null
CVE-2002-0727
The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method.
[ "cpe:2.3:a:microsoft:office_web_components:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_components:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-6495
Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-pxh7-6hfh-c7c3
Inductive Automation Ignition getJavaExecutable Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must connect to a malicious server.The specific flaw exists within the getJavaExecutable method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22029.
[]
null
null
8.8
null
RHSA-2023:0402
Red Hat Security Advisory: bind security update
bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
CVE-2016-8649
lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
[ "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*" ]
null
null
9.1
9
GHSA-956r-vx5g-74hw
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in Openads (aka phpAdsNew) 2.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) phpAds_geoPlugin parameter to libraries/lib-remotehost.inc, the (2) filename parameter to admin/report-index, or the (3) phpAds_config[my_footer] parameter to admin/lib-gui.inc. NOTE: the vendor has disputed this issue, stating that the relevant variables are used within function definitions.
[]
null
null
null
null
CVE-2021-32589
A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
[ "cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:*" ]
null
7.7
null
null
CVE-2017-11519
passwd_recovery.lua on the TP-Link Archer C9(UN)_V2_160517 allows an attacker to reset the admin password by leveraging a predictable random number generator seed. This is fixed in C9(UN)_V2_170511.
[ "cpe:2.3:o:tp-link:archer_c9_\\(2.0\\)_firmware:160517:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_c9_\\(2.0\\):-:*:*:*:*:*:*:*" ]
null
null
9.8
5
CVE-2009-5138
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
[ "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnutls:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnutls:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnutls:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnutls:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*" ]
null
null
null
5.8
RHSA-2024:3321
Red Hat Security Advisory: pcp security update
pcp: exposure of the redis server backend allows remote command execution via pmproxy
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.8
null
null
CVE-2022-22227
Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
[ "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", "cpe:2.3:h:juniper:acx7100-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:acx7100-48l:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:acx7509:-:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2018-4988
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2012-6557
Multiple cross-site scripting (XSS) vulnerabilities in the AboutMe plugin 1.1.1 for Vanilla Forums allow remote attackers to inject arbitrary web script or HTML via the (1) AboutMe/RealName, (2) AboutMe/Name, (3) AboutMe/Quote, (4) AboutMe/Loc, (5) AboutMe/Emp, (6) AboutMe/JobTit, (7) AboutMe/HS, (8) AboutMe/Col, (9) AboutMe/Bio, (10) AboutMe/Inter, (11) AboutMe/Mus, (12) AboutMe/Gam, (13) AboutMe/Mov, (14) AboutMe/FTV, or (15) AboutMe/Bks parameter to the Edit My Details page. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:zodiacdm:aboutme-plugin:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2025-32910
Libsoup: null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an unauthorized response with digest authentication
A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.
[ "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9" ]
null
6.5
null
null
CVE-2017-9184
libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-bmp.c:314:7.
[ "cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2005-2469
Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command.
[ "cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-r8mp-m6p8-pfwq
Multiple cross-site scripting (XSS) vulnerabilities in EZGallery 1.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) pUserID, (2) aid, (3) aname, (4) uid, and (5) m parameter in (a) common/galleries.asp; (6) aid, (7) aname, (8) uid, (9) m, (10) gp, and (11) g parameter in (b) common/pupload.asp; and (12) msg, (13) fn and (14) gp parameter in (c) common/upload.asp.
[]
null
null
null
null
GHSA-48hj-q7m7-jr56
Open redirect vulnerability in CyberMail Ver.6.x and Ver.7.x allows remote attackers to redirect users to arbitrary sites and conduct phishing attacks via a specially crafted URL.
[]
null
6.1
null
null
CVE-2004-1658
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
[ "cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-m7xj-7gmx-xmr5
A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel.
[]
null
7.4
null
null
GHSA-g3fx-gvwr-w892
Telegram before 7.4 (212543) Stable on macOS stores the local copy of self-destructed messages in a sandbox path, leading to sensitive information disclosure.
[]
null
null
null
null
RHSA-2005:782
Red Hat Security Advisory: util-linux and mount security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-3x85-6f44-2gm6
The CP_RC_TRANSACTION_CALL_BY_SET function in the Engineering Workbench component in SAP Production Planning and Control allows remote authenticated users to bypass intended transaction restrictions via unspecified vectors.
[]
null
null
null
null
CVE-2021-35968
Learningdigital.com, Inc. Orca HCM - Path Traversal-2
The directory list page parameter of the Orca HCM digital learning platform fails to filter special characters properly. Remote attackers can access the system directory thru Path Traversal with users’ privileges.
[ "cpe:2.3:a:learningdigital:orca_hcm:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-7g6q-fw46-cpmr
Citrix XenDesktop 7.x, 5.x, and 4.x, when pooled random desktop groups is enabled and ShutdownDesktopsAfterUse is disabled, allows local guest users to gain access to another user's desktop via unspecified vectors.
[]
null
null
null
null
GHSA-3c9q-xrh4-q9x9
The PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
[]
null
null
null
null
GHSA-6j4f-mgx9-pcwf
An exploitable information disclosure vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A HTTP request can result in disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability.
[]
null
null
5.3
null
CVE-2023-51691
WordPress wpDiscuz Plugin <= 7.6.12 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments – wpDiscuz allows Stored XSS.This issue affects Comments – wpDiscuz: from n/a through 7.6.12.
[ "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
GHSA-92rv-rf86-rg47
Use-after-free vulnerability in the PrintJob object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted addPage arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
[]
null
null
null
null
GHSA-8h4v-hmvj-59g5
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
[]
null
null
null
null
RHSA-2021:0383
Red Hat Security Advisory: RHV-M (ovirt-engine) 4.4.z security, bug fix, enhancement upd[ovirt-4.4.4] 0-day
ovirt-engine: non-admin user is able to access other users public SSH key
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
6.5
null
null
CVE-2023-52998
net: fec: Use page_pool_put_full_page when freeing rx buffers
In the Linux kernel, the following vulnerability has been resolved: net: fec: Use page_pool_put_full_page when freeing rx buffers The page_pool_release_page was used when freeing rx buffers, and this function just unmaps the page (if mapped) and does not recycle the page. So after hundreds of down/up the eth0, the system will out of memory. For more details, please refer to the following reproduce steps and bug logs. To solve this issue and refer to the doc of page pool, the page_pool_put_full_page should be used to replace page_pool_release_page. Because this API will try to recycle the page if the page refcnt equal to 1. After testing 20000 times, the issue can not be reproduced anymore (about testing 391 times the issue will occur on i.MX8MN-EVK before). Reproduce steps: Create the test script and run the script. The script content is as follows: LOOPS=20000 i=1 while [ $i -le $LOOPS ] do echo "TINFO:ENET $curface up and down test $i times" org_macaddr=$(cat /sys/class/net/eth0/address) ifconfig eth0 down ifconfig eth0 hw ether $org_macaddr up i=$(expr $i + 1) done sleep 5 if cat /sys/class/net/eth0/operstate | grep 'up';then echo "TEST PASS" else echo "TEST FAIL" fi Bug detail logs: TINFO:ENET up and down test 391 times [ 850.471205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL) [ 853.535318] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 853.541694] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx [ 870.590531] page_pool_release_retry() stalled pool shutdown 199 inflight 60 sec [ 931.006557] page_pool_release_retry() stalled pool shutdown 199 inflight 120 sec TINFO:ENET up and down test 392 times [ 991.426544] page_pool_release_retry() stalled pool shutdown 192 inflight 181 sec [ 1051.838531] page_pool_release_retry() stalled pool shutdown 170 inflight 241 sec [ 1093.751217] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL) [ 1096.446520] page_pool_release_retry() stalled pool shutdown 308 inflight 60 sec [ 1096.831245] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx [ 1096.839092] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 1112.254526] page_pool_release_retry() stalled pool shutdown 103 inflight 302 sec [ 1156.862533] page_pool_release_retry() stalled pool shutdown 308 inflight 120 sec [ 1172.674516] page_pool_release_retry() stalled pool shutdown 103 inflight 362 sec [ 1217.278532] page_pool_release_retry() stalled pool shutdown 308 inflight 181 sec TINFO:ENET up and down test 393 times [ 1233.086535] page_pool_release_retry() stalled pool shutdown 103 inflight 422 sec [ 1277.698513] page_pool_release_retry() stalled pool shutdown 308 inflight 241 sec [ 1293.502525] page_pool_release_retry() stalled pool shutdown 86 inflight 483 sec [ 1338.110518] page_pool_release_retry() stalled pool shutdown 308 inflight 302 sec [ 1353.918540] page_pool_release_retry() stalled pool shutdown 32 inflight 543 sec [ 1361.179205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL) [ 1364.255298] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx [ 1364.263189] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 1371.998532] page_pool_release_retry() stalled pool shutdown 310 inflight 60 sec [ 1398.530542] page_pool_release_retry() stalled pool shutdown 308 inflight 362 sec [ 1414.334539] page_pool_release_retry() stalled pool shutdown 16 inflight 604 sec [ 1432.414520] page_pool_release_retry() stalled pool shutdown 310 inflight 120 sec [ 1458.942523] page_pool_release_retry() stalled pool shutdown 308 inflight 422 sec [ 1474.750521] page_pool_release_retry() stalled pool shutdown 16 inflight 664 sec TINFO:ENET up and down test 394 times [ 1492.8305 ---truncated---
[]
null
null
null
null
GHSA-v247-54w9-fjrm
A vulnerability, which was classified as critical, was found in Ruijie RG-UAC 1.0. This affects an unknown part of the file /view/userAuthentication/SSO/commit.php. The manipulation of the argument ad_log_name leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
6.3
null
null
GHSA-8v5j-pwr7-w5f8
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.
[]
null
7.5
null
null
CVE-2016-10362
Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials.
[ "cpe:2.3:a:elasticsearch:output_plugin:*:*:*:*:*:logstash:*:*" ]
null
null
6.5
4
CVE-2022-28181
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.
[ "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*", "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:linux:*:*", "cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:windows:*:*" ]
null
8.5
null
null
CVE-2023-24559
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
[ "cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2017-7013
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxml2" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted XML file.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-9c83-5744-qr25
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
[]
null
null
null
null
GHSA-5crj-p3wq-23w2
Simulation models for KUKA.Sim Pro version 3.1 are hosted by a server maintained by KUKA. When these devices request a model, the server transmits the model in plaintext.
[]
null
null
null
null
CVE-2018-20395
NETWAVE MNG6200 C4835805jrc12FU121413.cpr devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
[ "cpe:2.3:o:net-wave:ming6200_firmware:c4835805jrc12fu121413.cpr:*:*:*:*:*:*:*", "cpe:2.3:h:net-wave:ming6200:1.01:*:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-229f-x33g-7vx4
Improper Neutralization of Script in Attributes in a Web Page vulnerability in Forcepoint Email Security (Blocked Messages module) allows Stored XSS. This issue affects Email Security through 8.5.5.
[]
null
6.1
null
null
GHSA-5p7g-qx77-8f6h
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.1. An app may be able to access protected user data.
[]
null
5.5
null
null
GHSA-qpv7-5p6w-329x
IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF17, and 8.5.0 before CF06 allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted request.
[]
null
null
null
null
CVE-2017-0366
SVG filter evasion using default attribute values in DTD declaration
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw allowing to evade SVG filter using default attribute values in DTD declaration.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
null
null
5.4
4
CVE-2022-3254
AWP Classifieds Plugin < 4.3 - Unauthenticated SQLi
The WordPress Classifieds Plugin WordPress plugin before 4.3 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users and when a specific premium module is active, leading to a SQL injection
[ "cpe:2.3:a:strategy11:awp_classifieds:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null