id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-jqj3-fh4v-x7hj | Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service that could allow an attacker to bypass authentication measures and gain controls over utilities within the products. | [] | 9.3 | null | null | null |
|
GHSA-p83g-m5q3-j96c | Multiple SQL injection vulnerabilities in NewLife Blogger before 3.3.1 allow remote attackers to execute arbitrary SQL commands via unknown attack vectors. | [] | null | null | null | null |
|
CVE-2018-1000607 | A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as. | [
"cpe:2.3:a:jenkins:fortify_cloudscan:*:*:*:*:*:jenkins:*:."
] | null | null | 6.5 | 4 |
|
GHSA-fx83-p5c7-qq9h | Buffer overflow in the FTP client in the Debian GNU/Linux netstd package. | [] | null | null | null | null |
|
CVE-2021-27494 | Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. | [
"cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2010-4167 | Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.4-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.5-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.6-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.7-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.8-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.9-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.0-11:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.1-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.2-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.3-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.4-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.4-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.4-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.4-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.5-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.6-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.7-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.8-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.4.9-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.0-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.1-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.2-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.3-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.4-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.5-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.6-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.7-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.8-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.5.9-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.0-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.1-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.2-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.3-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-9:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.4-10:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.6.5-3:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2022-49800 | tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() | In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()
test_gen_synth_cmd() only free buf in fail path, hence buf will leak
when there is no failure. Add kfree(buf) to prevent the memleak. The
same reason and solution in test_empty_synth_event().
unreferenced object 0xffff8881127de000 (size 2048):
comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s)
hex dump (first 32 bytes):
20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test
20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_
backtrace:
[<000000004254801a>] kmalloc_trace+0x26/0x100
[<0000000039eb1cf5>] 0xffffffffa00083cd
[<000000000e8c3bc8>] 0xffffffffa00086ba
[<00000000c293d1ea>] do_one_initcall+0xdb/0x480
[<00000000aa189e6d>] do_init_module+0x1cf/0x680
[<00000000d513222b>] load_module+0x6a50/0x70a0
[<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0
[<00000000b36c4c0f>] do_syscall_64+0x3f/0x90
[<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
unreferenced object 0xffff8881127df000 (size 2048):
comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s)
hex dump (first 32 bytes):
20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes
74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi
backtrace:
[<000000004254801a>] kmalloc_trace+0x26/0x100
[<00000000d4db9a3d>] 0xffffffffa0008071
[<00000000c31354a5>] 0xffffffffa00086ce
[<00000000c293d1ea>] do_one_initcall+0xdb/0x480
[<00000000aa189e6d>] do_init_module+0x1cf/0x680
[<00000000d513222b>] load_module+0x6a50/0x70a0
[<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0
[<00000000b36c4c0f>] do_syscall_64+0x3f/0x90
[<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd | [] | null | null | null | null |
CVE-2012-0814 | The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory. | [
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2011-1540 | Unspecified vulnerability in HP System Management Homepage (SMH) before 6.3 allows remote authenticated users to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.0-12:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.1-14:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.2-2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-gmvp-5rf9-mxcm | OpenStack Identity (Keystone) Multiple vulnerabilities in revocation events | The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token. | [] | 7.1 | 6.5 | null | null |
RHSA-2010:0291 | Red Hat Security Advisory: gfs-kmod security, bug fix and enhancement update | kernel: bug in GFS/GFS2 locking code leads to dos | [
"cpe:/a:redhat:rhel_cluster_storage:5"
] | null | null | null | null |
GHSA-f7r2-wm9j-6x59 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects. | [] | null | null | 6.5 | null |
|
CVE-2024-37649 | Insecure Permissions vulnerability in SecureSTATION v.2.5.5.3116-S50-SMA-B20160811A and before allows a physically proximate attacker to obtain sensitive information via the modification of user credentials. | [] | null | 4.6 | null | null |
|
CVE-2008-1072 | The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug. | [
"cpe:2.3:a:wireshark:wireshark:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
GHSA-547h-p6jv-c3g9 | A session fixation vulnerability in the B. Braun Melsungen AG SpaceCom administrative interface Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 allows remote attackers to hijack web sessions and escalate privileges. | [] | null | 8.1 | null | null |
|
CVE-2019-1436 | An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1440. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-2jjm-6whx-p8w4 | filp whoops Cross-site Scripting vulnerability | The dump function in `Util/TemplateHelper.php` in filp whoops before 2.1.13 has a Cross-site Scripting vulnerability. | [] | null | null | 6.1 | null |
GHSA-4mfx-6h3r-r7mp | A cross-site scripting (XSS) vulnerability in the openSelectManyUserPage?orgid interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | [] | null | 4.8 | null | null |
|
CVE-2001-1505 | tinc 1.0pre3 and 1.0pre4 allows remote attackers to inject data into user sessions by sniffing and replaying packets. | [
"cpe:2.3:a:tinc:tinc:1.0pre3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinc:tinc:1.0pre4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-f2mp-8fgg-7465 | Vertical Privilege Escalation in KONGA 0.14.9 allows attackers to higher privilege users to full administration access. The attack vector is a crafted condition, as demonstrated by the /api/user/{ID} at ADMIN parameter. | [] | null | 8.8 | null | null |
|
GHSA-83ff-cpf7-ghwf | A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration. | [] | null | 8.1 | null | null |
|
CVE-2014-9728 | The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-786q-qmm3-7c5g | IBM Campaign 9.1.2 and 10.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162172. | [] | null | 4.3 | null | null |
|
GHSA-3j5x-wxpv-2qp4 | In the ihevcd_decode function of ihevcd_decode.c, there is an infinite loop due to an incomplete frame error. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380403. | [] | null | null | 7.5 | null |
|
GHSA-m4hr-2hrx-m38c | mirror --script in lftp before 3.5.9 does not properly quote shell metacharacters, which might allow remote user-assisted attackers to execute shell commands via a malicious script. NOTE: it is not clear whether this issue crosses security boundaries, since the script already supports commands such as "get" which could overwrite executable files. | [] | null | null | null | null |
|
CVE-2018-7432 | Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request. | [
"cpe:2.3:a:splunk:splunk:*:*:*:*:light:*:*:*",
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-w7hr-v9m4-rf7p | The triggers in Oracle 9i and 10g allow local users to gain privileges by using a sequence of partially privileged actions: using CCBKAPPLROWTRIG or EXEC_CBK_FN_DML to add arbitrary functions to the SDO_CMT_DBK_FN_TABLE and SDO_CMT_CBK_DML_TABLE, then performing a DELETE on the SDO_TXN_IDX_INSERTS table, which causes the SDO_CMT_CBK_TRIG trigger to execute the user-supplied functions. | [] | null | null | null | null |
|
CVE-2010-0176 | Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability." | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-c787-p47f-ccwq | Deserialization of Untrusted Data vulnerability in Phan An AJAX Random Posts allows Object Injection.This issue affects AJAX Random Posts: from n/a through 0.3.3. | [] | null | 9.8 | null | null |
|
GHSA-qxg7-cvq5-m7w7 | The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions like subscribers, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-4g7j-2h92-xxp4 | Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges. | [] | null | null | null | null |
|
CVE-2020-15005 | In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 3.1 | null | 2.6 |
|
CVE-2022-21325 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 2.9 | null | null |
|
CVE-2017-14625 | ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2023-1194 | Use-after-free in parse_lease_state() | An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] | null | 7.1 | null | null |
CVE-2020-10228 | A file upload vulnerability in vtecrm vtenext 19 CE allows authenticated users to upload files with a .pht extension, resulting in remote code execution. | [
"cpe:2.3:a:vtenext:vtenext:19:*:*:*:community:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-1999-1201 | Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing. | [
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-2702 | Softwin WMX3 ImageAdd.ashx ImageAdd unrestricted upload | A vulnerability, which was classified as critical, has been found in Softwin WMX3 3.1. This issue affects the function ImageAdd of the file /ImageAdd.ashx. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-8hcc-v45g-cjg4 | Cross-site request forgery (CSRF) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. | [] | null | null | 8.8 | null |
|
GHSA-7784-w778-5qhf | Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in WP Chill Brilliance theme <= 1.3.1 versions. | [] | null | 5.4 | null | null |
|
CVE-2018-21257 | An issue was discovered in Mattermost Server before 5.1. It allows attackers to bypass intended access restrictions (for setting a channel header) via the Channel header slash command API. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
ICSA-18-114-03 | Advantech WebAccess HMI Designer | Heap-based buffer overflow vulnerabilities caused by processing specially crafted .pm3 files may allow remote code execution.CVE-2018-8833 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Double free vulnerabilities caused by processing specially crafted .pm3 files may allow remote code execution.CVE-2018-8835 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Processing specially crafted .pm3 files may cause the system to write outside the intended buffer area and may allow remote code execution.CVE-2018-8837 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). | [] | null | null | 6.3 | null |
GHSA-9w5h-w86f-p4cw | Reset to default settings may occur in Lenovo ThinkServer TSM RD350, RD450, RD550, RD650, TD350 during a prolonged broadcast storm in TSM versions earlier than 3.77. | [] | null | null | 7.5 | null |
|
GHSA-hq5r-m79m-vm9v | lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts. | [] | null | 7.5 | null | null |
|
GHSA-w7r5-4c54-wgj2 | OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b03b5. | [] | null | 6.5 | null | null |
|
GHSA-3749-62f5-h6xh | Missing Authorization vulnerability in Fatcat Apps Landing Page Cat.This issue affects Landing Page Cat: from n/a through 1.7.4. | [] | null | 5.4 | null | null |
|
GHSA-r894-5r7v-7rx3 | easy-scrypt Observable Timing Discrepancy vulnerability | A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function `VerifyPassphrase` of the file `scrypt.go`. The manipulation leads to observable timing discrepancy. Upgrading to version 1.0.0 can address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596. | [] | null | 5.3 | null | null |
CVE-2002-0491 | admin.php in AlGuest 1.0 guestbook checks for the existence of the admin cookie to authenticate the AlGuest administrator, which allows remote attackers to bypass the authentication and gain privileges by setting the admin cookie to an arbitrary value. | [
"cpe:2.3:a:alguest:alguest:1.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2008-5113 | WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection. | [
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2025-21089 | Arkcompiler Ets Runtime has an out-of-bounds read vulnerability | in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. | [] | null | 3.3 | null | null |
GHSA-9v9c-ff35-5vwx | The Project issue tracking module before 4.7.x-1.3, 4.7.x-2.* before 4.7.x-2.3, and 5 before 5.x-0.2-beta for Drupal allows remote authenticated users, with "access project issues" permission, to read the contents of a private node via a URL with a modified node identifier. | [] | null | null | null | null |
|
CVE-2009-0419 | Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-4033. | [
"cpe:2.3:a:microsoft:xml_core_services:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-rc63-j49f-5vh2 | mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\n. | [] | null | null | null | null |
|
GHSA-wxvf-839f-jqmh | Craft CMS Cross site Scripting vulnerability | Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via `src/helpers/Cp.php`. | [] | null | 5.4 | null | null |
CVE-2002-0727 | The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method. | [
"cpe:2.3:a:microsoft:office_web_components:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_components:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-6495 | Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-pxh7-6hfh-c7c3 | Inductive Automation Ignition getJavaExecutable Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must connect to a malicious server.The specific flaw exists within the getJavaExecutable method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22029. | [] | null | null | 8.8 | null |
|
RHSA-2023:0402 | Red Hat Security Advisory: bind security update | bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
CVE-2016-8649 | lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls. | [
"cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 9 |
|
GHSA-956r-vx5g-74hw | ** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in Openads (aka phpAdsNew) 2.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) phpAds_geoPlugin parameter to libraries/lib-remotehost.inc, the (2) filename parameter to admin/report-index, or the (3) phpAds_config[my_footer] parameter to admin/lib-gui.inc. NOTE: the vendor has disputed this issue, stating that the relevant variables are used within function definitions. | [] | null | null | null | null |
|
CVE-2021-32589 | A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device. | [
"cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
|
CVE-2017-11519 | passwd_recovery.lua on the TP-Link Archer C9(UN)_V2_160517 allows an attacker to reset the admin password by leveraging a predictable random number generator seed. This is fixed in C9(UN)_V2_170511. | [
"cpe:2.3:o:tp-link:archer_c9_\\(2.0\\)_firmware:160517:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:archer_c9_\\(2.0\\):-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
CVE-2009-5138 | GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959. | [
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
RHSA-2024:3321 | Red Hat Security Advisory: pcp security update | pcp: exposure of the redis server backend allows remote command execution via pmproxy | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
CVE-2022-22227 | Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO. | [
"cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx7100-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx7100-48l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx7509:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2018-4988 | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2012-6557 | Multiple cross-site scripting (XSS) vulnerabilities in the AboutMe plugin 1.1.1 for Vanilla Forums allow remote attackers to inject arbitrary web script or HTML via the (1) AboutMe/RealName, (2) AboutMe/Name, (3) AboutMe/Quote, (4) AboutMe/Loc, (5) AboutMe/Emp, (6) AboutMe/JobTit, (7) AboutMe/HS, (8) AboutMe/Col, (9) AboutMe/Bio, (10) AboutMe/Inter, (11) AboutMe/Mus, (12) AboutMe/Gam, (13) AboutMe/Mov, (14) AboutMe/FTV, or (15) AboutMe/Bks parameter to the Edit My Details page. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:zodiacdm:aboutme-plugin:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-32910 | Libsoup: null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an unauthorized response with digest authentication | A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash. | [
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] | null | 6.5 | null | null |
CVE-2017-9184 | libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-bmp.c:314:7. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2005-2469 | Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command. | [
"cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-r8mp-m6p8-pfwq | Multiple cross-site scripting (XSS) vulnerabilities in EZGallery 1.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) pUserID, (2) aid, (3) aname, (4) uid, and (5) m parameter in (a) common/galleries.asp; (6) aid, (7) aname, (8) uid, (9) m, (10) gp, and (11) g parameter in (b) common/pupload.asp; and (12) msg, (13) fn and (14) gp parameter in (c) common/upload.asp. | [] | null | null | null | null |
|
GHSA-48hj-q7m7-jr56 | Open redirect vulnerability in CyberMail Ver.6.x and Ver.7.x allows remote attackers to redirect users to arbitrary sites and conduct phishing attacks via a specially crafted URL. | [] | null | 6.1 | null | null |
|
CVE-2004-1658 | Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable. | [
"cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-m7xj-7gmx-xmr5 | A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel. | [] | null | 7.4 | null | null |
|
GHSA-g3fx-gvwr-w892 | Telegram before 7.4 (212543) Stable on macOS stores the local copy of self-destructed messages in a sandbox path, leading to sensitive information disclosure. | [] | null | null | null | null |
|
RHSA-2005:782 | Red Hat Security Advisory: util-linux and mount security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-3x85-6f44-2gm6 | The CP_RC_TRANSACTION_CALL_BY_SET function in the Engineering Workbench component in SAP Production Planning and Control allows remote authenticated users to bypass intended transaction restrictions via unspecified vectors. | [] | null | null | null | null |
|
CVE-2021-35968 | Learningdigital.com, Inc. Orca HCM - Path Traversal-2 | The directory list page parameter of the Orca HCM digital learning platform fails to filter special characters properly. Remote attackers can access the system directory thru Path Traversal with users’ privileges. | [
"cpe:2.3:a:learningdigital:orca_hcm:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-7g6q-fw46-cpmr | Citrix XenDesktop 7.x, 5.x, and 4.x, when pooled random desktop groups is enabled and ShutdownDesktopsAfterUse is disabled, allows local guest users to gain access to another user's desktop via unspecified vectors. | [] | null | null | null | null |
|
GHSA-3c9q-xrh4-q9x9 | The PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-6j4f-mgx9-pcwf | An exploitable information disclosure vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A HTTP request can result in disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability. | [] | null | null | 5.3 | null |
|
CVE-2023-51691 | WordPress wpDiscuz Plugin <= 7.6.12 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments – wpDiscuz allows Stored XSS.This issue affects Comments – wpDiscuz: from n/a through 7.6.12.
| [
"cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-92rv-rf86-rg47 | Use-after-free vulnerability in the PrintJob object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted addPage arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [] | null | null | null | null |
|
GHSA-8h4v-hmvj-59g5 | The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive. | [] | null | null | null | null |
|
RHSA-2021:0383 | Red Hat Security Advisory: RHV-M (ovirt-engine) 4.4.z security, bug fix, enhancement upd[ovirt-4.4.4] 0-day | ovirt-engine: non-admin user is able to access other users public SSH key | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 6.5 | null | null |
CVE-2023-52998 | net: fec: Use page_pool_put_full_page when freeing rx buffers | In the Linux kernel, the following vulnerability has been resolved:
net: fec: Use page_pool_put_full_page when freeing rx buffers
The page_pool_release_page was used when freeing rx buffers, and this
function just unmaps the page (if mapped) and does not recycle the page.
So after hundreds of down/up the eth0, the system will out of memory.
For more details, please refer to the following reproduce steps and
bug logs. To solve this issue and refer to the doc of page pool, the
page_pool_put_full_page should be used to replace page_pool_release_page.
Because this API will try to recycle the page if the page refcnt equal to
1. After testing 20000 times, the issue can not be reproduced anymore
(about testing 391 times the issue will occur on i.MX8MN-EVK before).
Reproduce steps:
Create the test script and run the script. The script content is as
follows:
LOOPS=20000
i=1
while [ $i -le $LOOPS ]
do
echo "TINFO:ENET $curface up and down test $i times"
org_macaddr=$(cat /sys/class/net/eth0/address)
ifconfig eth0 down
ifconfig eth0 hw ether $org_macaddr up
i=$(expr $i + 1)
done
sleep 5
if cat /sys/class/net/eth0/operstate | grep 'up';then
echo "TEST PASS"
else
echo "TEST FAIL"
fi
Bug detail logs:
TINFO:ENET up and down test 391 times
[ 850.471205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)
[ 853.535318] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 853.541694] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 870.590531] page_pool_release_retry() stalled pool shutdown 199 inflight 60 sec
[ 931.006557] page_pool_release_retry() stalled pool shutdown 199 inflight 120 sec
TINFO:ENET up and down test 392 times
[ 991.426544] page_pool_release_retry() stalled pool shutdown 192 inflight 181 sec
[ 1051.838531] page_pool_release_retry() stalled pool shutdown 170 inflight 241 sec
[ 1093.751217] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)
[ 1096.446520] page_pool_release_retry() stalled pool shutdown 308 inflight 60 sec
[ 1096.831245] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 1096.839092] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 1112.254526] page_pool_release_retry() stalled pool shutdown 103 inflight 302 sec
[ 1156.862533] page_pool_release_retry() stalled pool shutdown 308 inflight 120 sec
[ 1172.674516] page_pool_release_retry() stalled pool shutdown 103 inflight 362 sec
[ 1217.278532] page_pool_release_retry() stalled pool shutdown 308 inflight 181 sec
TINFO:ENET up and down test 393 times
[ 1233.086535] page_pool_release_retry() stalled pool shutdown 103 inflight 422 sec
[ 1277.698513] page_pool_release_retry() stalled pool shutdown 308 inflight 241 sec
[ 1293.502525] page_pool_release_retry() stalled pool shutdown 86 inflight 483 sec
[ 1338.110518] page_pool_release_retry() stalled pool shutdown 308 inflight 302 sec
[ 1353.918540] page_pool_release_retry() stalled pool shutdown 32 inflight 543 sec
[ 1361.179205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)
[ 1364.255298] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 1364.263189] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 1371.998532] page_pool_release_retry() stalled pool shutdown 310 inflight 60 sec
[ 1398.530542] page_pool_release_retry() stalled pool shutdown 308 inflight 362 sec
[ 1414.334539] page_pool_release_retry() stalled pool shutdown 16 inflight 604 sec
[ 1432.414520] page_pool_release_retry() stalled pool shutdown 310 inflight 120 sec
[ 1458.942523] page_pool_release_retry() stalled pool shutdown 308 inflight 422 sec
[ 1474.750521] page_pool_release_retry() stalled pool shutdown 16 inflight 664 sec
TINFO:ENET up and down test 394 times
[ 1492.8305
---truncated--- | [] | null | null | null | null |
GHSA-v247-54w9-fjrm | A vulnerability, which was classified as critical, was found in Ruijie RG-UAC 1.0. This affects an unknown part of the file /view/userAuthentication/SSO/commit.php. The manipulation of the argument ad_log_name leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 6.3 | null | null |
|
GHSA-8v5j-pwr7-w5f8 | HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers. | [] | null | 7.5 | null | null |
|
CVE-2016-10362 | Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials. | [
"cpe:2.3:a:elasticsearch:output_plugin:*:*:*:*:*:logstash:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2022-28181 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components. | [
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:windows:*:*"
] | null | 8.5 | null | null |
|
CVE-2023-24559 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2017-7013 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxml2" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted XML file. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-9c83-5744-qr25 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. | [] | null | null | null | null |
|
GHSA-5crj-p3wq-23w2 | Simulation models for KUKA.Sim Pro version 3.1 are hosted by a server maintained by KUKA. When these devices request a model, the server transmits the model in plaintext. | [] | null | null | null | null |
|
CVE-2018-20395 | NETWAVE MNG6200 C4835805jrc12FU121413.cpr devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. | [
"cpe:2.3:o:net-wave:ming6200_firmware:c4835805jrc12fu121413.cpr:*:*:*:*:*:*:*",
"cpe:2.3:h:net-wave:ming6200:1.01:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-229f-x33g-7vx4 | Improper Neutralization of Script in Attributes in a Web Page vulnerability in Forcepoint Email Security (Blocked Messages module) allows Stored XSS.
This issue affects Email Security through 8.5.5. | [] | null | 6.1 | null | null |
|
GHSA-5p7g-qx77-8f6h | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.1. An app may be able to access protected user data. | [] | null | 5.5 | null | null |
|
GHSA-qpv7-5p6w-329x | IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF17, and 8.5.0 before CF06 allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted request. | [] | null | null | null | null |
|
CVE-2017-0366 | SVG filter evasion using default attribute values in DTD declaration | Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw allowing to evade SVG filter using default attribute values in DTD declaration. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 4 |
CVE-2022-3254 | AWP Classifieds Plugin < 4.3 - Unauthenticated SQLi | The WordPress Classifieds Plugin WordPress plugin before 4.3 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users and when a specific premium module is active, leading to a SQL injection | [
"cpe:2.3:a:strategy11:awp_classifieds:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.