id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2017-9689
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a specially-crafted HDMI CEC message can be used to cause stack memory corruption.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
CVE-2023-29930
An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.
[ "cpe:2.3:a:genesys:tftp_server:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2012-0022
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
[ "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2019-19702
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this to perform a denial of service against the DMARC reporting functionality, such as by referencing the /dev/random file within XML documents that are emailed to the address in the rua field of the DMARC records of a domain.
[ "cpe:2.3:a:modoboa:modoboa-dmarc:1.1.0:*:*:*:*:modoboa:*:*" ]
null
7.5
null
5
CVE-2020-3702
u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150
[ "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5502_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:arista:access_point:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:av2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c75-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:o90e:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.5
null
3.3
CVE-2018-16032
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-7x75-r7f7-mqrx
Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.
[]
null
7.8
null
null
CVE-2020-36306
Redmine before 4.0.7 and 4.1.x before 4.1.1 has XSS via the back_url field.
[ "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-cqpw-mc9f-6gf5
A race condition was addressed with additional validation. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
CVE-2023-22295
CVE-2023-22295
Datakit CrossCadWare_x64.dll contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information.
[ "cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2008-3759
Cross-site request forgery (CSRF) vulnerability in ajax/UpdateCheck.php in Vanilla 1.1.4 and earlier has unknown impact and remote attack vectors.
[ "cpe:2.3:a:lussumo:vanilla:*:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:lussumo:vanilla:1.1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2007-3298
SQL injection vulnerability in Spey before 0.4.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors related to MessageProcessor.cc and possibly other components.
[ "cpe:2.3:a:spey:spey:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2020:0026
Red Hat Security Advisory: kpatch-patch security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6.5
null
GHSA-hxm2-r34f-qmc5
Regular Expression Denial of Service in minimatch
Affected versions of `minimatch` are vulnerable to regular expression denial of service attacks when user input is passed into the `pattern` argument of `minimatch(path, pattern)`.Proof of ConceptRecommendationUpdate to version 3.0.2 or later.
[]
null
null
7.5
null
CVE-2016-2244
HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:h:hp:a2w75a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w76a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w77a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w78a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w79a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b3g85a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b5l04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b5l05a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b5l07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:c2s11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:c2s12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ca251a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cc522a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cc523a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cc524a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cd644a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cd645a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cd646a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce989a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce990a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce991a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce992a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce993a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce994a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce995a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce996a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf066a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf067a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf068a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf069a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf081a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf082a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf083a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf116a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf117a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf118a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf235a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf236a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf238a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf367a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz244a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz245a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz249a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz250a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz255a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz256a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz257a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz258a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3l08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3l09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3l10a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d7p70a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d7p71a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j7x28a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:futuresmart_firmware:*:*:*:*:*:*:*:*" ]
null
null
5.9
5
CVE-2020-13338
An issue has been discovered in GitLab affecting versions prior to 12.10.13, 13.0.8, 13.1.2. A stored cross-site scripting vulnerability was discovered when editing references.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5.4
null
null
GHSA-45hm-gg77-pjg9
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the progress bar element attributes in all versions up to, and including, 3.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This primarily affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
5.5
null
null
GHSA-jrfh-6m24-g6jv
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000006e10."
[]
null
null
7.8
null
CVE-2021-29971
If a user had granted a permission to a webpage and saved that grant, any webpage running on the same host - irrespective of scheme or port - would be granted that permission. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*" ]
null
9.8
null
7.5
CVE-2024-37266
WordPress Tutor LMS plugin <= 2.7.1 - Path Traversal vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themeum Tutor LMS allows Path Traversal.This issue affects Tutor LMS: from n/a through 2.7.1.
[ "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*" ]
null
4.9
null
null
CVE-2020-0662
A remote code execution vulnerability exists in the way that Windows handles objects in memory, aka 'Windows Remote Code Execution Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2018-4965
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Memory Corruption vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2023-40597
Absolute Path Traversal in Splunk Enterprise Using runshellscript.py
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:splunk:splunk:9.1.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2025:0548
Red Hat Security Advisory: iperf3 security update
iperf: Denial of Service in iperf Due to Improper JSON Handling
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
GHSA-wcc5-qj8j-6xc5
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Never5 Post Connector plugin <= 1.0.9 versions.
[]
null
5.9
null
null
CVE-2023-48390
Multisuns EasyLog web+ - Command Injection
Multisuns EasyLog web+ has a code injection vulnerability. An unauthenticated remote attacker can exploit this vulnerability to inject code and access the system to perform arbitrary system operations or disrupt service.
[ "cpe:2.3:o:multisuns:easylog_web\\+_firmware:1.13.2.8:*:*:*:*:*:*:*", "cpe:2.3:h:multisuns:easylog_web\\+:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2021-45089
Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.
[ "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*" ]
null
5.2
null
2.3
CVE-2023-23313
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
[ "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860n-plus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860n-plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860vn-plus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860vn-plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2860ln_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2860ln:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2765va_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2765va:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:vigornic_132_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigornic_132:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor3220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor3220:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2962_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2962:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2962p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2962p:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor1000b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor1000b:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2952_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2952:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2952p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2952p:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927f:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2927lac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2927lac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926ln_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926ln:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2926lac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2926lac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925n-plus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925n-plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925vn-plus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925vn-plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925fn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925fn:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2925ln_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2925ln:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2915_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2915:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2915ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2915ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2866_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2866:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2866ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2866ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2866ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2866ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2866vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2866vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2866l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2866l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2866lac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2866lac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2865_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2865:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2865ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2865ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2865ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2865ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2865vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2865vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2865l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2865l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2865lac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2865lac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862n:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862vac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862vac:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862b:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862bn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862bn:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862l:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862ln_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862ln:-:*:*:*:*:*:*:*", "cpe:2.3:o:draytek:virgor2862lac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:virgor2862lac:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-j2xf-p274-g8cc
Cross-site Scripting in Jirafeau
The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
[]
null
6.1
null
null
GHSA-323m-j8jx-g8pq
Ericsson Network Manager (ENM), versions prior to 22.2, contains a vulnerability in the REST endpoint “editprofile” where Open Redirect HTTP Header Injection can lead to redirection of the submitted request to domain out of control of ENM deployment. The attacker would need admin/elevated access to exploit the vulnerability
[]
null
4.8
null
null
CVE-2012-4946
Agile FleetCommander and FleetCommander Kiosk before 4.08 use an XOR format for password encryption, which makes it easier for context-dependent attackers to obtain sensitive information by reading a key file and the encrypted strings.
[ "cpe:2.3:a:agilefleet:fleetcommander:*:*:*:*:*:*:*:*", "cpe:2.3:a:agilefleet:fleetcommander_kiosk:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-3w94-w3gc-69pw
SQL injection vulnerability in sorter.php in the phpManufaktur kitForm extension 0.43 and earlier for the KeepInTouch (KIT) module allows remote attackers to execute arbitrary SQL commands via the sorter_value parameter.
[]
null
null
null
null
CVE-2021-25671
A vulnerability has been identified in RWG1.M12 (All versions < V1.16.16), RWG1.M12D (All versions < V1.16.16), RWG1.M8 (All versions < V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations.
[ "cpe:2.3:o:siemens:rwg1.m12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rwg1.m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:rwg1.m12d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rwg1.m12d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:rwg1.m8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rwg1.m8:-:*:*:*:*:*:*:*" ]
null
4.3
null
3.3
CVE-2019-12887
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2).
[ "cpe:2.3:a:keyidentity:linotp:*:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
GHSA-vh2f-wj96-fxxh
In the Linux kernel, the following vulnerability has been resolved:RDMA/mlx5: Fix fortify source warning while accessing Eth segment------------[ cut here ]------------ memcpy: detected field-spanning write (size 56) of single field "eseg->inline_hdr.start" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2) WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy [last unloaded: mlx_compat(OE)] CPU: 0 PID: 293779 Comm: ssh Tainted: G OE 6.2.0-32-generic #32~22.04.1-Ubuntu Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da <0f> 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7 RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8 R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80 FS: 00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? show_regs+0x72/0x90 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] ? __warn+0x8d/0x160 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] ? report_bug+0x1bb/0x1d0 ? handle_bug+0x46/0x90 ? exc_invalid_op+0x19/0x80 ? asm_exc_invalid_op+0x1b/0x20 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib] ipoib_send+0x2ec/0x770 [ib_ipoib] ipoib_start_xmit+0x5a0/0x770 [ib_ipoib] dev_hard_start_xmit+0x8e/0x1e0 ? validate_xmit_skb_list+0x4d/0x80 sch_direct_xmit+0x116/0x3a0 __dev_xmit_skb+0x1fd/0x580 __dev_queue_xmit+0x284/0x6b0 ? _raw_spin_unlock_irq+0xe/0x50 ? __flush_work.isra.0+0x20d/0x370 ? push_pseudo_header+0x17/0x40 [ib_ipoib] neigh_connected_output+0xcd/0x110 ip_finish_output2+0x179/0x480 ? __smp_call_single_queue+0x61/0xa0 __ip_finish_output+0xc3/0x190 ip_finish_output+0x2e/0xf0 ip_output+0x78/0x110 ? __pfx_ip_finish_output+0x10/0x10 ip_local_out+0x64/0x70 __ip_queue_xmit+0x18a/0x460 ip_queue_xmit+0x15/0x30 __tcp_transmit_skb+0x914/0x9c0 tcp_write_xmit+0x334/0x8d0 tcp_push_one+0x3c/0x60 tcp_sendmsg_locked+0x2e1/0xac0 tcp_sendmsg+0x2d/0x50 inet_sendmsg+0x43/0x90 sock_sendmsg+0x68/0x80 sock_write_iter+0x93/0x100 vfs_write+0x326/0x3c0 ksys_write+0xbd/0xf0 ? do_syscall_64+0x69/0x90 __x64_sys_write+0x19/0x30 do_syscall_ ---truncated---
[]
null
7.8
null
null
GHSA-398x-qm59-5hfg
Insecure permissions in the file database.sdb of BatFlat CMS v1.3.6 allows attackers to dump the entire database.
[]
null
7.5
null
null
CVE-2004-1207
The Serious engine, as used in (1) Alpha Black Zero Intrepid Protocol 1.04 and earlier, (2) Nitro family, and (3) Serious Sam Second Encounter 1.07 allows remote attackers to cause a denial of service (server crash) via a large number of UDP join requests that exceeds the maximum player limit, as originally reported for Alpha Black Zero.
[ "cpe:2.3:a:serioussam:seriousengine:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2018-18320
An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because exec.php has a popen call. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution
[ "cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac68uf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac68uf:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac87_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac87:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac1900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac1900:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac86u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac86u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac2900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac2900:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-8rcx-6793-p6gv
An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.)
[]
null
null
8.8
null
GHSA-6897-q7x3-3q64
Cross-site request forgery (CSRF) vulnerability in the Entry Manager in Serendipity before 1.0-beta3 allows remote attackers to perform unauthorized actions as a logged-in user via a link or IMG tag.
[]
null
null
null
null
GHSA-qqq8-rp9h-4f9h
Windows Bluetooth Driver Elevation of Privilege Vulnerability
[]
null
7.4
null
null
CVE-2009-0465
The SaveDoc method in the All_In_The_Box.AllBox ActiveX control in ALL_IN_THE_BOX.OCX in Synactis ALL In-The-Box ActiveX 3 allows remote attackers to create and overwrite arbitrary files via an argument ending in a '\0' character, which bypasses the intended .box filename extension, as demonstrated by a C:\boot.ini\0 argument.
[ "cpe:2.3:a:synactis:all_in_the_box.ocx:3:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-7phf-pg77-8mwx
pdfjam creates the (1) pdf90, (2) pdfjoin, and (3) pdfnup files with a predictable name, which allows local users to overwrite arbitrary files via a symlink attack.
[]
null
null
null
null
GHSA-jc86-5gcp-4hv4
SQL injection vulnerability in the navigation module (navigationmodule) in Exponent CMS 0.96.3 and later versions allows remote attackers to execute arbitrary SQL commands via the parent parameter.
[]
null
null
null
null
CVE-2022-3064
Excessive resource consumption in gopkg.in/yaml.v2
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
[ "cpe:2.3:a:yaml_project:yaml:*:*:*:*:*:go:*:*" ]
null
7.5
null
null
CVE-2021-40985
A stack-based buffer under-read in htmldoc before 1.9.12, allows attackers to cause a denial of service via a crafted BMP image to image_load_bmp.
[ "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2006-6252
Microsoft Windows Live Messenger 8.0 and earlier, when gestual emoticons are enabled, allows remote attackers to cause a denial of service (CPU consumption) via a long string composed of ":D" sequences, which are interpreted as emoticons.
[ "cpe:2.3:a:microsoft:windows_live_messenger:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2018-1363
IBM Jazz Reporting Service (JRS) 5.0 through 5.0.2 and 6.0 through 6.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 137448.
[ "cpe:2.3:a:ibm:jazz_reporting_service:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.5:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2013-1502
Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" ]
null
null
null
1.5
GHSA-9phm-fm57-rhg8
Panic when parsing invalid palette-color images in golang.org/x/image
Parsing a corrupt or malicious image with invalid color indices can cause a panic.
[]
8.7
7.5
null
null
GHSA-p3q9-8vf2-3jfg
Cross-Site Request Forgery (CSRF) vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Cross Site Request Forgery. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3.
[]
null
4.3
null
null
ICSA-18-256-01
Honeywell Mobile Computers with Android Operating Systems
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.CVE-2018-14825 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H).
[]
null
null
7.6
null
GHSA-6x76-3m56-7fw4
Opera before 9.0 does not reset the SSL security bar after displaying a download dialog from an SSL-enabled website, which allows remote attackers to spoof a trusted SSL certificate from an untrusted website and facilitates phishing attacks.
[]
null
null
null
null
CVE-2010-1776
Find My iPhone on iOS 2.0 through 3.1.3 for iPhone 3G and later and iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device.
[ "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*" ]
null
null
4.8
4.9
CVE-2018-4379
A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. This issue affected versions prior to iOS 12.0.1.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
CVE-2019-2790
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*" ]
null
null
5.4
5.5
GHSA-938h-r443-c3jh
The OS deployment feature in Baramundi Management Suite 7.5 through 8.9 stores credentials in cleartext on deployed machines, which allows remote attackers to obtain sensitive information by reading a file. NOTE: this ID was also incorrectly mapped to a separate issue in Oracle Outside In, but the correct ID for that issue is CVE-2013-5763.
[]
null
null
null
null
RHSA-2013:0744
Red Hat Security Advisory: kernel security and bug fix update
Kernel: xfrm_user information leaks copy_to_user_ Kernel: xfrm_user: info leak in copy_to_user_auth Kernel: atm: information leak in getsockopt & getsockname Kernel: net/tun: ioctl() based information leaks kernel: bluetooth HIDP implementation information disclosure Kernel: drm/i915: heap writing overflow Kernel: tmpfs: fix use-after-free of mempolicy object kernel: VFAT slab-based buffer overflow Kernel: USB io_ti driver NULL pointer dereference in routine chase_port Kernel: keys: race condition in install_user_keyrings() kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME kernel: kvm: out-of-bounds access in ioapic indirect register reads Kernel: xfrm_user: return error pointer instead of NULL Kernel: dccp: check ccid before NULL poiter dereference kernel: pty layer race condition leading to memory corruption
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2017-6392
An issue was discovered in Kaltura server Lynx-12.11.0. The vulnerability exists due to insufficient filtration of user-supplied data passed to the "server-Lynx-12.11.0/admin_console/web/tools/XmlJWPlayer.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[ "cpe:2.3:a:kaltura:kaltura_server:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2024-24955
Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb69fc`.
[ "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-mw36-7c6c-q4q2
XStream can be used for Remote Code Execution
ImpactThe vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.WorkaroundsNo user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.Users of XStream 1.4.13 can simply add two lines to XStream's setup code:Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:CreditsChen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[]
null
8
null
null
GHSA-7qh7-p336-4rfg
A vulnerability was found in WiseCleaner Wise Folder Hider 4.4.3.202. It has been declared as problematic. Affected by this vulnerability is an unknown functionality in the library WiseFs64.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-222361 was assigned to this vulnerability.
[]
null
5.5
null
null
GHSA-xqm9-g4jx-xvgw
Metamail before 2.7-7.2 allows remote attackers to overwrite arbitrary files via an e-mail message containing a uuencoded attachment that specifies the full pathname for the file to be modified, which is processed by uuencode in Metamail scripts such as sun-audio-file.
[]
null
null
null
null
CVE-2006-7165
IBM WebSphere Application Server (WAS) 5.0 through 5.1.1.0 allows remote attackers to obtain JSP source code and other sensitive information via certain "special URIs."
[ "cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-29c8-3p4j-qm8x
Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X do not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
[]
null
null
null
null
CVE-2024-56553
binder: fix memleak of proc->delivered_freeze
In the Linux kernel, the following vulnerability has been resolved: binder: fix memleak of proc->delivered_freeze If a freeze notification is cleared with BC_CLEAR_FREEZE_NOTIFICATION before calling binder_freeze_notification_done(), then it is detached from its reference (e.g. ref->freeze) but the work remains queued in proc->delivered_freeze. This leads to a memory leak when the process exits as any pending entries in proc->delivered_freeze are not freed: unreferenced object 0xffff38e8cfa36180 (size 64): comm "binder-util", pid 655, jiffies 4294936641 hex dump (first 32 bytes): b8 e9 9e c8 e8 38 ff ff b8 e9 9e c8 e8 38 ff ff .....8.......8.. 0b 00 00 00 00 00 00 00 3c 1f 4b 00 00 00 00 00 ........<.K..... backtrace (crc 95983b32): [<000000000d0582cf>] kmemleak_alloc+0x34/0x40 [<000000009c99a513>] __kmalloc_cache_noprof+0x208/0x280 [<00000000313b1704>] binder_thread_write+0xdec/0x439c [<000000000cbd33bb>] binder_ioctl+0x1b68/0x22cc [<000000002bbedeeb>] __arm64_sys_ioctl+0x124/0x190 [<00000000b439adee>] invoke_syscall+0x6c/0x254 [<00000000173558fc>] el0_svc_common.constprop.0+0xac/0x230 [<0000000084f72311>] do_el0_svc+0x40/0x58 [<000000008b872457>] el0_svc+0x38/0x78 [<00000000ee778653>] el0t_64_sync_handler+0x120/0x12c [<00000000a8ec61bf>] el0t_64_sync+0x190/0x194 This patch fixes the leak by ensuring that any pending entries in proc->delivered_freeze are freed during binder_deferred_release().
[]
null
3.3
null
null
CVE-2010-3502
Unspecified vulnerability in the Siebel Core component in Oracle Siebel Suite 7.7.2.12, 7.8.2.14, 8.0.0.10, and 8.1.1.3 allows remote authenticated users to affect confidentiality via unknown vectors.
[ "cpe:2.3:a:oracle:siebel_suite:7.7.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_suite:7.8.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_suite:8.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_suite:8.1.1.3:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-pr34-rqwj-mc34
The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable.
[]
null
null
null
null
GHSA-3r65-cwvq-rgv3
SQL injection vulnerability in addsale.php in iScripts eSwap 2.0 allows remote attackers to execute arbitrary SQL commands via the type parameter.
[]
null
null
null
null
CVE-2006-2768
PHP remote file inclusion vulnerability in METAjour 2.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the (1) system_path parameter in a large number of files in the (a) app/edocument/, (b) app/eproject/, (c) app/erek/, and (d) extension/ directories, and the (2) GLOBALS[system_path] parameter in (e) extension/sitemap/sitemap.datatype.php.
[ "cpe:2.3:a:ipw_systems:metajour:2.1:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2018-8147
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8148, CVE-2018-8162.
[ "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_for_mac:2016:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-h5rh-jw67-x3pc
An issue was discovered in atillk64.sys in AMD ATI Diagnostics Hardware Abstraction Sys/Overclocking Utility 5.11.9.0. The vulnerable driver exposes a wrmsr instruction and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.
[]
null
null
null
null
GHSA-p2v4-fw4j-mfg2
Cross-Site Request Forgery (CSRF) vulnerability in A WP Life Right Click Disable OR Ban allows Stored XSS. This issue affects Right Click Disable OR Ban: from n/a through 1.1.17.
[]
null
7.1
null
null
CVE-2017-10823
Untrusted search path vulnerability in Installer for Shin Kinkyuji Houkoku Data Nyuryoku Program (program released on 2011 March 10) Distributed on the website till 2017 May 17 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:enecho.meti:shin_kinkyuji_houkoku_data_nyuryoku_program:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
RHBA-2020:5307
Red Hat Bug Fix Advisory: openvswitch2.11 bug fix and enhancement update
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ]
null
9.8
null
null
GHSA-6jhm-j4gf-hvjx
Avast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22963.
[]
null
null
7.8
null
CVE-2012-1419
The TAR file parser in ClamAV 0.96.4 and Quick Heal (aka Cat QuickHeal) 11.00 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
[ "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-vfvp-6x8c-w6jm
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ attribute of the Team Members widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-8m9c-cw9q-49fh
An issue was discovered in Foxit Reader and PhantomPDF before 9.7. It has a NULL pointer dereference.
[]
null
null
null
null
CVE-2016-7545
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
[ "cpe:2.3:a:selinux_project:selinux:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
8.8
7.2
CVE-2022-46340
A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
[ "cpe:2.3:a:x.org:x_server:1.20.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2021-21388
Command Injection Vulnerability in systeminformation
systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version >= 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected.
[ "cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*" ]
null
8.9
null
null
CVE-2023-21408
Insufficient file permissions leak user credentials of 3rd party integration interfaces in AXIS License Verifier ACAP
Due to insufficient file permissions, unprivileged users could gain access to unencrypted user credentials that are used in the integration interface towards 3rd party systems.
[ "cpe:2.3:a:axis:license_plate_verifier:*:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-h4fp-2jq4-jm9w
An authentication bypass vulnerability on UTStar WA3002G4 ADSL Broadband Modem WA3002G4-0021.01 devices allows attackers to directly access administrative settings and obtain cleartext credentials from HTML source, as demonstrated by info.cgi, upload.cgi, backupsettings.cgi, pppoe.cgi, resetrouter.cgi, and password.cgi.
[]
null
null
9.8
null
CVE-2022-38086
WordPress Shortcodes Ultimate plugin <= 5.12.0 - Cross-Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Shortcodes Ultimate plugin <= 5.12.0 at WordPress leading to plugin preset settings change.
[ "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-xp5j-75x6-qx28
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
[]
null
null
null
null
CVE-2022-42524
In sms_GetTpUdlIe of sms_PduCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243401445References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2017-15338
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
[ "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*" ]
null
null
3.7
4.3
CVE-2016-1524
Multiple unrestricted file upload vulnerabilities in NETGEAR Management System NMS300 1.5.0.11 and earlier allow remote attackers to execute arbitrary Java code by using (1) fileUpload.do or (2) lib-1.0/external/flash/fileUpload.do to upload a JSP file, and then accessing it via a direct request for a /null URI.
[ "cpe:2.3:a:netgear:prosafe_network_management_software_300:*:*:*:*:*:*:*:*" ]
null
null
9.6
8.3
GHSA-6rpp-7f67-x23f
Out-of-bounds access can occur in camera driver due to improper validation of array index in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, QCN7605, SDA660, SDM450, SDM630, SDM636, SDM660, SDX20
[]
null
null
null
null
GHSA-x2mm-r6mf-3xg7
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
null
null
CVE-2021-33364
Memory leak in the def_parent_box_new function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
[ "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-3fpr-96rf-fw9f
Cross-site scripting (XSS) vulnerability on Chiyu BF-630, BF-630W, and BF-660C fingerprint access-control devices allows remote attackers to inject arbitrary web script or HTML via a SCRIPT element.
[]
null
null
null
null
GHSA-rr7h-5qv5-g84f
Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
[]
null
null
null
null
CVE-2007-1153
Multiple PHP remote file inclusion vulnerabilities in CutePHP CuteNews 1.3.6 allow remote attackers to execute arbitrary PHP code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: issue might overlap CVE-2004-1660 or CVE-2006-4445.
[ "cpe:2.3:a:cutephp:cutenews:1.3.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2013:0730
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-11) flash-plugin: multiple code execution flaws (APSB13-11) flash-plugin: multiple code execution flaws (APSB13-11) flash-plugin: Remote attackers able to execute arbitrary code via vectors that leverage an 'overflow' (CanSecWest 2013)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
CVE-2023-22599
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-760: Use of a One-way Hash with a Predictable Salt. They  send MQTT credentials in response to HTTP/HTTPS requests from the cloud platform. These credentials are encoded using a hardcoded string into an MD5 hash. This string could be easily calculated by an unauthorized user who spoofed sending an HTTP/HTTPS request to the devices. This could result in the affected devices being temporarily disconnected from the cloud platform and allow the user to receive MQTT commands with potentially sensitive information.
[ "cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:*", "cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:*" ]
null
7
null
null
GHSA-hpjg-hqr4-wggc
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device. Cisco has not released software updates to address this vulnerability.
[]
null
null
4.8
null
CVE-2022-44640
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
[ "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-53687
riscv: Fix IPIs usage in kfence_protect_page()
In the Linux kernel, the following vulnerability has been resolved: riscv: Fix IPIs usage in kfence_protect_page() flush_tlb_kernel_range() may use IPIs to flush the TLBs of all the cores, which triggers the following warning when the irqs are disabled: [ 3.455330] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520 [ 3.456647] Modules linked in: [ 3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7-00010-g91d3de7240b8 #1 [ 3.457416] Hardware name: QEMU QEMU Virtual Machine, BIOS [ 3.457633] epc : smp_call_function_many_cond+0x452/0x520 [ 3.457736] ra : on_each_cpu_cond_mask+0x1e/0x30 [ 3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50 [ 3.457824] gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f [ 3.457859] t1 : ffffffff815221e0 t2 : 000000000000000f s0 : ff2000000000bc10 [ 3.457920] s1 : 0000000000000040 a0 : ffffffff815221e0 a1 : 0000000000000001 [ 3.457953] a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000 [ 3.458006] a5 : 0000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000 [ 3.458042] s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0 [ 3.458076] s5 : ff600001ff950d00 s6 : 0000000200000120 s7 : 0000000000000001 [ 3.458109] s8 : 0000000000000001 s9 : ff60000080841ef0 s10: 0000000000000001 [ 3.458141] s11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0 [ 3.458172] t5 : 0000000000000000 t6 : ff200000000236d0 [ 3.458203] status: 0000000200000100 badaddr: ffffffff800b669a cause: 0000000000000003 [ 3.458373] [<ffffffff800b669a>] smp_call_function_many_cond+0x452/0x520 [ 3.458593] [<ffffffff800b67c2>] on_each_cpu_cond_mask+0x1e/0x30 [ 3.458625] [<ffffffff8000e4ca>] __flush_tlb_range+0x118/0x1ca [ 3.458656] [<ffffffff8000e6b2>] flush_tlb_kernel_range+0x1e/0x26 [ 3.458683] [<ffffffff801ea56a>] kfence_protect+0xc0/0xce [ 3.458717] [<ffffffff801e9456>] kfence_guarded_free+0xc6/0x1c0 [ 3.458742] [<ffffffff801e9d6c>] __kfence_free+0x62/0xc6 [ 3.458764] [<ffffffff801c57d8>] kfree+0x106/0x32c [ 3.458786] [<ffffffff80588cf2>] detach_buf_split+0x188/0x1a8 [ 3.458816] [<ffffffff8058708c>] virtqueue_get_buf_ctx+0xb6/0x1f6 [ 3.458839] [<ffffffff805871da>] virtqueue_get_buf+0xe/0x16 [ 3.458880] [<ffffffff80613d6a>] virtblk_done+0x5c/0xe2 [ 3.458908] [<ffffffff8058766e>] vring_interrupt+0x6a/0x74 [ 3.458930] [<ffffffff800747d8>] __handle_irq_event_percpu+0x7c/0xe2 [ 3.458956] [<ffffffff800748f0>] handle_irq_event+0x3c/0x86 [ 3.458978] [<ffffffff800786cc>] handle_simple_irq+0x9e/0xbe [ 3.459004] [<ffffffff80073934>] generic_handle_domain_irq+0x1c/0x2a [ 3.459027] [<ffffffff804bf87c>] imsic_handle_irq+0xba/0x120 [ 3.459056] [<ffffffff80073934>] generic_handle_domain_irq+0x1c/0x2a [ 3.459080] [<ffffffff804bdb76>] riscv_intc_aia_irq+0x24/0x34 [ 3.459103] [<ffffffff809d0452>] handle_riscv_irq+0x2e/0x4c [ 3.459133] [<ffffffff809d923e>] call_on_irq_stack+0x32/0x40 So only flush the local TLB and let the lazy kfence page fault handling deal with the faults which could happen when a core has an old protected pte version cached in its TLB. That leads to potential inaccuracies which can be tolerated when using kfence.
[]
null
null
null
null