id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-0632 | Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770. | [
"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*"
] | null | null | null | 5.7 |
|
CVE-2010-2313 | Directory traversal vulnerability in index.php in Anodyne Productions SIMM Management System (SMS) 2.6.10, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter to index.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:anodyne-productions:simm_management_system:2.6.10:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-pc93-vg6c-p2c9 | IBM Security Secret Server 10.7 could allow an attacker to obtain sensitive information due to an overly permissive CORS policy. IBM X-Force ID: 170007. | [] | null | null | null | null |
|
PYSEC-2014-110 | null | Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_form_title.html in Mayan EDMS 0.13 allow remote authenticated users to inject arbitrary web script or HTML via a (1) tag or the (2) title of a source in a Staging folder, (3) Name field in a bootstrap setup, or Title field in a (4) smart link or (5) web form. | [] | null | null | null | null |
CVE-2024-3907 | Tenda AC500 setcfm formSetCfm stack-based overflow | A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*"
] | null | 8.8 | 8.8 | 9 |
CVE-2018-18253 | An issue was discovered in CapMon Access Manager 5.4.1.1005. CALRunElevated.exe attempts to enforce access control by adding an unprivileged user to the local Administrators group for a very short time to execute a single command. However, the user is left in that group if the command crashes, and there is also a race condition in all cases. | [
"cpe:2.3:a:capmon:access_manager:*:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
GHSA-2v7r-pp26-r79c | In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | [] | null | 5.5 | null | null |
|
GHSA-c4pq-7f26-f57v | Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call. | [] | null | null | null | null |
|
GHSA-8q6r-7pj6-2j2p | Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege | [] | null | 7.3 | null | null |
|
GHSA-c3x9-5mjf-g3qh | The _dwarf_get_size_of_val function in libdwarf/dwarf_util.c in Libdwarf before 20161124 allows remote attackers to cause a denial of service (out-of-bounds read) by calling the dwarfdump command on a crafted file. | [] | null | 6.5 | null | null |
|
CVE-2006-0332 | Pantomime in Ecartis 1.0.0 snapshot 20050909 stores e-mail attachments in a publicly accessible directory, which may allow remote attackers to upload arbitrary files. | [
"cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2005-09-09:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-m8gj-8mqg-2pwg | name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone. | [] | null | null | null | null |
|
CVE-2017-15978 | AROX School ERP PHP Script 1.0 allows SQL Injection via the office_admin/ id parameter. | [
"cpe:2.3:a:arox:school_erp_php_script:1.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2021-28091 | Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature. | [
"cpe:2.3:a:entrouvert:lasso:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-cm3v-7fgr-4cc4 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer De-reference Vulnerability." | [] | null | 7.1 | null | null |
|
GHSA-m6j8-vc6j-wp2h | The BQ 5515L Android device with a build fingerprint of BQru/BQru-5515L/BQru-5515L:8.1.0/O11019/20180409.195525:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | [] | null | null | null | null |
|
CVE-2013-3076 | The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c. | [
"cpe:2.3:o:linux:linux_kernel:*:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-mfqq-9fqv-736q | The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type != 2" case, a similar issue to CVE-2017-9870. | [] | null | null | 5.5 | null |
|
CVE-2008-1694 | vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files. | [
"cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:sccs:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
RHSA-2021:4914 | Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:container_native_virtualization:4.8::el8"
] | null | 6.5 | null | null |
CVE-2022-41522 | TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an unauthenticated stack overflow via the "main" function. | [
"cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-12592 | Sellsy <= 2.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Sellsy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'testSellsy' shortcode in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-9hv6-pv7m-2p8w | PHP remote file inclusion vulnerability in includes/class_template.php in Categories hierarchy (aka CH or mod-CH) 2.1.2 in ptirhiikmods allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [] | null | null | null | null |
|
GHSA-hg6x-48fw-wrwv | Forcepoint
NGFW Security Management Center Management Server has SMC Downloads
optional feature to offer standalone Management Client downloads and ECA
configuration downloads.Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Next Generation Firewall Security Management Center (SMC Downloads feature) allows Reflected XSS.This issue affects Next Generation Firewall Security Management Center : before 6.10.13, from 6.11.0 before 7.1.2. | [] | null | 6.1 | null | null |
|
CVE-2005-2496 | The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended. | [
"cpe:2.3:a:dave_mills:ntpd:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2020-3415 | Cisco NX-OS Software Data Management Engine Remote Code Execution Vulnerability | A vulnerability in the Data Management Engine (DME) of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Exploitation of this vulnerability also requires jumbo frames to be enabled on the interface that receives the crafted Cisco Discovery Protocol packets on the affected device. | [
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-hh6q-4r6g-qqjg | The Play.ht – Make Your Blog Posts Accessible With Text to Speech Audio plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.6.4 via deserialization of untrusted input from the play_podcast_data post meta. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [] | null | 8.8 | null | null |
|
CVE-2007-0441 | Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 6.20, 6.4x, 7.01, and 7.50 allows remote attackers to execute arbitrary commands via unknown vectors. | [
"cpe:2.3:a:hp:openview_network_node_manager:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.50:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-wcr3-8jhg-v89r | Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device. These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read of the valid Cisco Discovery Protocol packet data, which could allow the attacker to cause corruption in the internal Cisco Discovery Protocol database of the affected device. | [] | null | 8.8 | null | null |
|
CVE-2022-36468 | H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed. | [
"cpe:2.3:o:h3c:b5_mini_firmware:b5miniv100r005:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:b5_mini:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2016-3445 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.3.0 allows remote attackers to affect availability via vectors related to Web Container, a different vulnerability than CVE-2016-5488. | [
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2024-38221 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Microsoft Edge (Chromium-based) Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-mpgp-pjvr-xfcq | A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0889, CVE-2020-0953, CVE-2020-0959, CVE-2020-0988, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008. | [] | null | null | null | null |
|
CVE-2021-24751 | GenerateBlocks < 1.4.0 - Contributor+ Stored Cross-Site Scripting | The GenerateBlocks WordPress plugin before 1.4.0 does not validate the generateblocks/container block's tagName attribute, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks. | [
"cpe:2.3:a:generateblocks:generateblocks:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
CVE-2021-28184 | ASUS BMC's firmware: buffer overflow - Active Directory configuration function | The Active Directory configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. | [
"cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
CVE-2024-10070 | ESAFENET CDG PolicyPushControlAction.java actionPolicyPush sql injection | A vulnerability classified as critical has been found in ESAFENET CDG 5. This affects the function actionPolicyPush of the file /com/esafenet/policy/action/PolicyPushControlAction.java. The manipulation of the argument policyId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
RHSA-2021:3146 | Red Hat Security Advisory: ACS 3.64 security and enhancement update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:advanced_cluster_security:3.64::el8"
] | null | 6.5 | null | null |
CVE-2017-6978 | An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "Accessibility Framework" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-v3g2-4wc8-vvrm | PHP remote file inclusion vulnerability in MamboLogin.php in the MamboWiki component (com_mambowiki) 0.9.6 and earlier for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter. | [] | null | null | null | null |
|
CVE-2014-3147 | Cross-site scripting (XSS) vulnerability in the auto-complete feature in Splunk Enterprise before 6.0.4 allows remote authenticated users to inject arbitrary web script or HTML via a CSV file. | [
"cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:6.0.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2017-2750 | Insufficient Solution DLL Signature Validation allows potential execution of arbitrary code in HP LaserJet Enterprise printers, HP PageWide Enterprise printers, HP LaserJet Managed printers, HP OfficeJet Enterprise printers before 2308937_578479, 2405087_018548, and other firmware versions. | [
"cpe:2.3:o:hp:l2683a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l2683a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l2717a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l2717a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l2762a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l2762a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z13a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z13a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z5g79a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z5g79a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u42a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u42a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z08a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z08a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z14a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z14a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z5g77a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z5g77a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z03a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z03a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z07a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z07a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z05a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z05a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u43a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u43a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w41a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w41a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w41v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w41v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z06a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z06a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w46a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w46a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w46v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w46v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w47v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w47v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u44a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u44a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w47a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w47a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z09a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z09a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z10a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z11a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z11a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z12a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z12a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w39a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w39a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w39v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w39v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w40a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w40a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w40v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w40v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z04a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z04a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:c2s11a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c2s11a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:c2s12a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c2s12a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:c2s11v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c2s11v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:c2s12v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c2s12v-:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l1h45a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l1h45a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l06a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l06a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l06v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l06v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l07a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l07a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l04a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l04a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l05a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l05a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l04v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l04v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l05v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l05v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u40a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u40a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u41a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u41a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j74a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j74a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j79a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j79a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j80a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j66a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j66a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j73a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j73a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m0p33a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m0p33a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m0p35a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m0p35a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m0p36a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m0p36a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m0p40a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m0p40a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m0p39a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m0p39a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf066a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf066a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf067a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf067a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf068a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf068a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf069a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf069a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j76a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j70a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j71a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j71a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j63a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j63a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j65a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b3g84a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b3g84a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b3g86a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b3g86a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7x28a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7x28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz244a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz244a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz245a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz245a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q20a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q20a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q21a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q22a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q22a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q17a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q17a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q19a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q18a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q18a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q14a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q14a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k0q15a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k0q15a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b72a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b72a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b73a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b73a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b69a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b69a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b70a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b71a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b71a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b67a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b67a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e6b68a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e6b68a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a76a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a77a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a77a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a81a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a81a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a68a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a68a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a69a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a69a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a70a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f2a71a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f2a71a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce503a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce503a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce504a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce504a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce738a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce738a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j64a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j64a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j72a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j72a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8j78a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8j78a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b3g85a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b3g85a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf118a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf118a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf367a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf367a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cd646a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cd646a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf081a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf081a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf082a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf082a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf083a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf083a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a2w76a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a2w75a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w75a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d7p71v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7p71v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d7p71a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7p71a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d7p68a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7p68a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u51a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u51a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u52a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u52a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u65a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a2w77a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w77a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a2w78a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w78a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a2w79a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w79a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d7p73a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7p73a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf235a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf235a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf236a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf236a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf238a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf238a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce989a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce989a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce990a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce990a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce991a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce991a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce992a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce992a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce993a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce993a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce994a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce994a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce995a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce995a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce996a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce996a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf116a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf116a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u59a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u59a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cf117a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf117a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u60a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u60a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cd645a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cd645a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cd644a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cd644a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u66a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u66a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u70a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u56a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u56a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l3u55a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l3u55a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz250a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz250a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz251a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz251a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz248a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz248a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz249a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz249a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a10a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a11a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a11a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l46a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l46a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l47a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l47a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l48a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l48a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l49a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l49a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l54a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l54a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l50a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l50a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3l08a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3l08a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3l09a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3l09a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3l10a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3l10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z98a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z98a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7z99a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7z99a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a04a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a04a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a05a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a05a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a06a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a06a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz255a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz255a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz256a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz256a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz257a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz257a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz258a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz258a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l23a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l23a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l24a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l24a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l25a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l25a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b5l26a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l26a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a12a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a12a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a13a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a13a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j8a17a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8a17a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce707a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce707a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce708a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce708a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ce709a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce709a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cc419a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cc419a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cc420a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cc420a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cc421a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cc421a:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-9hwg-3f52-9mx8 | Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations. | [] | null | null | null | null |
|
CVE-2021-38989 | IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212951. | [
"cpe:2.3:a:ibm:vios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2.5.100:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.3.0.0:*:*:*:*:*:*:*"
] | null | null | 6.2 | null |
|
RHSA-2022:0993 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-oslo-utils) security update | python-oslo-utils: incorrect password masking in debug output | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 6 | null | null |
CVE-2024-0836 | The WordPress Review & Structure Data Schema Plugin – Review Schema plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the rtrs_review_edit() function in all versions up to, and including, 2.1.14. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify arbitrary reviews. | [
"cpe:2.3:a:radiustheme:review_schema:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
GHSA-hv4v-wchr-58g4 | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | [] | null | 8.8 | null | null |
|
PYSEC-2022-43142 | null | Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3. | [] | null | 7.8 | null | null |
PYSEC-2023-169 | null | Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash.
| [] | null | 7.8 | null | null |
CVE-2009-3243 | Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote attackers to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations. | [
"cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-36512 | WordPress AutomateWoo plugin <= 5.7.5 - Broken Access Control vulnerability | Missing Authorization vulnerability in Woo AutomateWoo.This issue affects AutomateWoo: from n/a through 5.7.5. | [
"cpe:2.3:a:woo:automatewoo:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2011-1872 | Hyper-V in Microsoft Windows Server 2008 Gold, SP2, R2, and R2 SP1 allows guest OS users to cause a denial of service (host OS infinite loop) via malformed machine instructions in a VMBus packet, aka "VMBus Persistent DoS Vulnerability." | [
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*"
] | null | null | null | 4.7 |
|
CVE-2016-0908 | EMC Isilon OneFS 7.1.x before 7.1.1.9 and 7.2.x before 7.2.1.2 allows local users to obtain root shell access by leveraging administrative privileges. | [
"cpe:2.3:o:emc:isilon_onefs:7.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:isilon_onefs:7.2.1.1:*:*:*:*:*:*:*"
] | null | null | 6.7 | 6.8 |
|
GHSA-9hwq-6r39-wmwf | SQL injection vulnerability in pmlite.php in RunCMS 1.2 and 1.3a allows remote attackers to execute arbitrary SQL commands via the to_userid parameter. | [] | null | null | null | null |
|
CVE-2015-1133 | fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1134, and CVE-2015-1135. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2021-23857 | Login with hash | Login with hash: The login routine allows the client to log in to the system not by using the password, but by using the hash of the password. Combined with CVE-2021-23858, this allows an attacker to subsequently login to the system. | [
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l65_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_l85_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_l85:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_xm22_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_xm22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_xm21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_xm21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_xm41_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_xm41:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_mlc_xm42_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_mlc_xm42:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:rexroth_indramotion_xlc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:rexroth_indramotion_xlc:-:*:*:*:*:*:*:*"
] | null | 10 | null | null |
GHSA-2whf-925v-qjcf | Cross-site scripting (XSS) vulnerability in the servlet engine and Web container in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-6xpg-gw5j-9x8w | gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device. | [] | null | null | 5.9 | null |
|
GHSA-7352-jw4q-788p | Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [] | null | null | null | null |
|
GHSA-phrv-v8gj-645h | In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, a vulnerability exists in undisclosed pages of the BIG-IP DNS Traffic Management User Interface (TMUI) that allows an authenticated attacker with at least operator role privileges to cause the Tomcat process to restart and perform unauthorized DNS requests and operations through undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [] | null | 6.5 | null | null |
|
RHSA-2019:2154 | Red Hat Security Advisory: opensc security, bug fix, and enhancement update | opensc: Buffer overflows handling responses from Muscle Cards in card-muscle.c:muscle_list_files() opensc: Buffer overflows handling responses from TCOS Cards in card-tcos.c:tcos_select_file() opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key() opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() opensc: Buffer overflows handling responses from CAC Cards in card-cac.c:cac_get_serial_nr_from_CUID() opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() opensc: Out of bounds reads handling responses from smartcards | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
CVE-2024-33768 | lunasvg v2.3.9 was discovered to contain a segmentation violation via the component composition_solid_source_over. | [
"cpe:2.3:a:sammycage:lunasvg:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-3frc-6c5w-8j5w | Cross-site request forgery (CSRF) vulnerability in index/manager/fileUpload in Public Knowledge Project Open Journal Systems 2.3.6 and earlier allows remote attackers to hijack the authentication of administrators for requests that upload PHP files. | [] | null | null | null | null |
|
GHSA-wp6x-2jj2-vxhw | Puppet Enterprise presented a security risk by not sanitizing user input when doing a CSV export. | [] | null | null | null | null |
|
cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | Multiple vulnerabilities in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.
These vulnerabilities are due to insufficient input validation when processing specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The Security Impact Rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.
Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75279"]. | [] | null | 4.6 | null | null |
CVE-2020-25717 | A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*"
] | null | 8.1 | null | 8.5 |
|
GHSA-vr42-r92j-3v22 | Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS message. | [] | null | null | null | null |
|
GHSA-rq7c-4cjv-jhvx | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [] | null | null | 8.8 | null |
|
CVE-2011-5283 | Cross-site scripting (XSS) vulnerability in the web management interface in httpd/cgi-bin/ipinfo.cgi in Smoothwall Express 3.1 and 3.0 SP3 and earlier allows remote attackers to inject arbitrary web script or HTML via the IP parameter in a Run action. | [
"cpe:2.3:o:smoothwall:smoothwall:3.0:sp3:*:*:express:*:*:*",
"cpe:2.3:o:smoothwall:smoothwall:3.1:*:*:*:express:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-8037 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-p8m8-7wqx-pmvj | The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file. | [] | null | null | null | null |
|
GHSA-j544-hhc5-ccvv | SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext(). | [] | null | 9.8 | null | null |
|
GHSA-qm45-ph68-vwcc | ImageMagick 7.0.11-14 has a memory leak in AcquireSemaphoreMemory in semaphore.c and AcquireMagickMemory in memory.c. | [] | null | null | null | null |
|
GHSA-5426-qc78-q4wm | Multiple unspecified vulnerabilities in ageet AGEphone before 1.6.3 allow remote attackers to have an unknown impact via malformed SIP packets. | [] | null | null | null | null |
|
CVE-2025-32653 | WordPress Cart66 Cloud Plugin <= 2.3.7 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lee Blue Cart66 Cloud allows Reflected XSS. This issue affects Cart66 Cloud: from n/a through 2.3.7. | [] | null | 7.1 | null | null |
CVE-2011-5195 | Cross-site request forgery (CSRF) vulnerability in index/manager/fileUpload in Public Knowledge Project Open Conference Systems 2.3.4 and earlier allows remote attackers to hijack the authentication of administrators for requests that upload a PHP file. | [
"cpe:2.3:a:public_knowledge_project:open_conference_systems:*:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1.1.-2:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.1.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:public_knowledge_project:open_conference_systems:2.3.3-1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-5738 | The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack. | [
"cpe:2.3:a:marvell:software_development_kit:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:marvell:octeon_ii_cn6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:marvell:octeon_ii_cn6010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:marvell:octeon_ii_cn6020:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2015-5194 | The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands. | [
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:manager:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:manager_proxy:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:openstack_cloud:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:*:p40:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-31456 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13102. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
RHSA-2021:1373 | Red Hat Security Advisory: kernel security and bug fix update | kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null |
GHSA-p4xp-95h3-7gxv | An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file. | [] | null | 5.5 | null | null |
|
GHSA-m4wj-hhwj-47qp | Drupal Core Cross-Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Drupal core allows Cross-Site Scripting (XSS).This issue affects Drupal core: from 8.0.0 before 10.3.14, from 10.4.0 before 10.4.5, from 11.0.0 before 11.0.13, from 11.1.0 before 11.1.5. | [] | 1.3 | 5.4 | null | null |
GHSA-rrxf-p629-997j | SkyStream EMR5000 1.16 through 1.18 does not drop packets or disable the Ethernet interface when the buffers are full, which allows remote attackers to cause a denial of service (null pointer exception and kernel panic) via a large number of packets. | [] | null | 7.5 | null | null |
|
CVE-2023-45660 | Require strict cookies for image proxy requests in Nextcloud Mail | Nextcloud mail is an email app for the Nextcloud home server platform. In affected versions a missing check of origin, target and cookies allows for an attacker to abuse the proxy endpoint to denial of service a third server. It is recommended that the Nextcloud Mail is upgraded to 2.2.8 or 3.3.0. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2025-2580 | Contact Form by Bit Form <= 2.18.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [] | null | 4.9 | null | null |
GHSA-g962-r766-7j3p | The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges. | [] | null | null | null | null |
|
GHSA-rrvv-gf86-xrp2 | Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions." | [] | null | null | null | null |
|
RHSA-2020:2823 | Red Hat Security Advisory: nghttp2 security update | nghttp2: overly large SETTINGS frames can lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
GHSA-w64g-6fpq-3hxr | An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka 'Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
CVE-2006-1667 | SQL injection vulnerability in slides.php in Eric Gerdes Crafty Syntax Image Gallery (CSIG) (aka PHP thumbnail Photo Gallery) 3.1g and earlier allows remote authenticated users to execute arbitrary SQL commands via the limitquery_s parameter when the $projectid variable is less than 1, which prevents the $limitquery_s from being set within slides.php. | [
"cpe:2.3:a:crafty_syntax_image_gallery:crafty_syntax_image_gallery:3.1g:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2025-46866 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
CVE-2023-2071 | FactoryTalk View Machine Edition Vulnerable to Remote Code Execution |
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. The device has the functionality, through a CIP class, to execute exported functions from libraries. There is a routine that restricts it to execute specific functions from two dynamic link library files. By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.
| [
"cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*",
"cpe:2.3:h:rockwellautomation:panelview_plus:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-qxv8-g8q7-36cp | Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option. | [] | null | null | null | null |
|
RHSA-2024:9636 | Red Hat Security Advisory: webkit2gtk3 security update | webkit: heap use-after-free may lead to arbitrary code execution chromium-browser: Use after free in ANGLE webkitgtk: A malicious website may cause unexpected cross-origin behavior webkitgtk: Processing web content may lead to arbitrary code execution webkit: pointer authentication bypass webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkit: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing web content may lead to a denial-of-service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
GHSA-r8g9-x5r3-7rc6 | The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue. | [] | null | null | null | null |
|
GHSA-5gp8-cj7x-g2vr | Cross-site scripting (XSS) vulnerability in staticpages/easypublish/index.php in EasyNews 4.0 allows remote attackers to inject arbitrary web script or HTML via the read parameter in an edp_pupublish action. | [] | null | null | null | null |
|
CVE-2021-21114 | Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2020-26906 | Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. | [
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
CVE-2022-0979 | Use after free in Safe Browsing in Google Chrome on Android prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2015-1318 | The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container). | [
"cpe:2.3:a:apport_project:apport:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.17:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-39wj-cf86-6v9w | The Tutor LMS plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.4. This is due to missing or incorrect nonce validation on the 'addon_enable_disable' function. This makes it possible for unauthenticated attackers to enable or disable addons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.