id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2013-2012 | autojump before 21.5.8 allows local users to gain privileges via a Trojan horse custom_install directory in the current working directory. | [
"cpe:2.3:a:autojump_project:autojump:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | 4.4 |
|
CVE-2009-1270 | libclamav/untar.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-hwc2-6cgc-779p | Certain NETGEAR devices are affected by authentication bypass. This affects AC2400 before 1.1.0.84, AC2600 before 1.1.0.84, D7000 before 1.0.1.82, R6020 before 1.0.0.52, R6080 before 1.0.0.52, R6120 before 1.0.0.80, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.84, R6330 before 1.1.0.84, R6350 before 1.1.0.84, R6700v2 before 1.1.0.84, R6800 before 1.1.0.84, R6850 before 1.1.0.84, R6900v2 before 1.1.0.84, R7200 before 1.1.0.84, R7350 before 1.1.0.84, R7400 before 1.1.0.84, and R7450 before 1.1.0.84. | [] | null | 9.8 | null | null |
|
GHSA-4g23-3mc5-9qf9 | An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server. | [] | null | null | null | null |
|
CVE-2020-16098 | It is possible to enumerate access card credentials via an unauthenticated network connection to the server in versions of Command Centre v8.20 prior to v8.20.1166(MR3), versions of 8.10 prior to v8.10.1211(MR5), versions of 8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier. These credentials can then be used to encode low security cards to be used by the system where insecure card technologies are supported. | [
"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.00.1228:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.10.1211:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.20.1166:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.30.1236:-:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-6507 | Deep Lake Kaggle command injection | Command injection when ingesting a remote Kaggle dataset due to a lack of input sanitization in the ingest_kaggle() API | [
"cpe:2.3:a:deeplake:deeplake:3.9.10:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
RHSA-2018:0058 | Red Hat Security Advisory: qemu-kvm-rhev security update | An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | null | null |
GHSA-mrg8-h43c-3q4j | A vulnerability was discovered in SS in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves a NULL pointer dereference which can cause abnormal termination of a mobile phone via a manipulated packet. | [] | null | 5.3 | null | null |
|
CVE-2024-49604 | WordPress Simple User Registration plugin <= 5.5 - Account Takeover vulnerability | Authentication Bypass Using an Alternate Path or Channel vulnerability in Najeeb Ahmad Simple User Registration allows Authentication Bypass.This issue affects Simple User Registration: from n/a through 5.5. | [
"cpe:2.3:a:najeeb_ahmad:simple_user_registration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:najeebmedia:simple_user_registration:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
GHSA-57pq-pp54-cgmc | Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2, when the AlwaysDownloadAttachments config setting is not in use, allows remote attackers to inject arbitrary web script or HTML via a file upload with an unspecified content type. | [] | null | null | 6.1 | null |
|
GHSA-6xf7-p3jx-g67x | Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3095, CVE-2015-5087, CVE-2015-5094, CVE-2015-5100, CVE-2015-5102, CVE-2015-5103, and CVE-2015-5104. | [] | null | null | null | null |
|
GHSA-hf29-9hfh-w63j | Duplicate Advisory: Gogs allows argument injection during the previewing of changes | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-9pp6-wq8c-3w2c. This link is maintained to preserve external references.Original DescriptionGogs through 0.13.0 allows argument injection during the previewing of changes. | [] | 9.4 | 9.9 | null | null |
GHSA-gmmm-vrfh-pfj9 | Unspecified vulnerability in the WebLogic Portal component in BEA Product Suite 10.3, 10.2, 10.0 MP1, 9.2 MP3, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [] | null | null | null | null |
|
GHSA-8w66-g4m4-h3qv | SAP BusinessObjects Business Intelligence platform, versions 410, 420, allows an authenticated attacker to inject malicious JavaScript payload into the custom value input field of an Input Control, which can be executed by User who views the relevant application content, which leads to Stored Cross-Site Scripting. | [] | null | null | null | null |
|
GHSA-pwc7-rcq3-j2vw | In the Linux kernel, the following vulnerability has been resolved:arm64/fpsimd: Discard stale CPU state when handling SME trapsThe logic for handling SME traps manipulates saved FPSIMD/SVE/SME state
incorrectly, and a race with preemption can result in a task having
TIF_SME set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SME traps enabled). This can result in warnings from
do_sme_acc() where SME traps are not expected while TIF_SME is set:| /* With TIF_SME userspace shouldn't generate any traps */
| if (test_and_set_thread_flag(TIF_SME))
| WARN_ON(1);This is very similar to the SVE issue we fixed in commit:751ecf6afd6568ad ("arm64/sve: Discard stale CPU state when handling SVE traps")The race can occur when the SME trap handler is preempted before and
after manipulating the saved FPSIMD/SVE/SME state, starting and ending on
the same CPU, e.g.| void do_sme_acc(unsigned long esr, struct pt_regs *regs)
| {
| // Trap on CPU 0 with TIF_SME clear, SME traps enabled
| // task->fpsimd_cpu is 0.
| // per_cpu_ptr(&fpsimd_last_state, 0) is task.
|
| ...
|
| // Preempted; migrated from CPU 0 to CPU 1.
| // TIF_FOREIGN_FPSTATE is set.
|
| get_cpu_fpsimd_context();
|
| /* With TIF_SME userspace shouldn't generate any traps */
| if (test_and_set_thread_flag(TIF_SME))
| WARN_ON(1);
|
| if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
| unsigned long vq_minus_one =
| sve_vq_from_vl(task_get_sme_vl(current)) - 1;
| sme_set_vq(vq_minus_one);
|
| fpsimd_bind_task_to_cpu();
| }
|
| put_cpu_fpsimd_context();
|
| // Preempted; migrated from CPU 1 to CPU 0.
| // task->fpsimd_cpu is still 0
| // If per_cpu_ptr(&fpsimd_last_state, 0) is still task then:
| // - Stale HW state is reused (with SME traps enabled)
| // - TIF_FOREIGN_FPSTATE is cleared
| // - A return to userspace skips HW state restore
| }Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.Note: this was originallly posted as [1].[ Rutland: rewrite commit message ] | [] | null | null | null | null |
|
GHSA-2jg6-w6jg-4rh2 | Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819. | [] | null | 6.5 | null | null |
|
GHSA-fwr2-hpwg-f69q | Unified Automation UaGateway OPC UA Server Use-After-Free Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability.The specific flaw exists within the implementation of the ImportXML function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20497. | [] | null | null | 6.5 | null |
|
GHSA-qhqw-wg75-8f69 | The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more. | [] | null | 5.3 | null | null |
|
GHSA-86qm-m584-7grg | A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_fuel.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2022-40816 | Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2. | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2002-2105 | Microsoft Windows XP allows local users to prevent the system from booting via a corrupt explorer.exe.manifest file. | [
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2025-23423 | WordPress SendGrid for WordPress plugin <= 1.4 - Broken Access Control vulnerability | Missing Authorization vulnerability in Smackcoders SendGrid for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SendGrid for WordPress: from n/a through 1.4. | [] | null | 4.3 | null | null |
GHSA-j36c-g9g3-m3ph | Incorrect handling of picture ID in WebRTC in Google Chrome prior to 58.0.3029.96 for Mac, Windows, and Linux allowed a remote attacker to trigger a race condition via a crafted HTML page. | [] | null | 7.5 | null | null |
|
GHSA-7mqh-jgh5-fv37 | A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the arpbrocast binary. | [] | null | 9.8 | null | null |
|
GHSA-3fhv-q33v-8j9m | Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network. | [] | null | 8.8 | null | null |
|
GHSA-pxxv-rv32-2qgv | OpenStack Nova uses insecure keystone middleware tmpdir by default | keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. | [] | null | 4.3 | null | null |
CVE-2024-36840 | SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a remote attacker to execute arbitrary code and obtain sensitive information via the id parameter to news_details.php and location_details.php; and the section parameter to services.php. | [
"cpe:2.3:a:boelter:blue_system_management:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2024-12233 | code-projects Online Notice Board Profile Picture registration.php unrestricted upload | A vulnerability was found in code-projects Online Notice Board up to 1.0 and classified as critical. This issue affects some unknown processing of the file /registration.php of the component Profile Picture Handler. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:kashipara:online_notice_board_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fabianros:online_notice_board:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2024-20918 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:graalvm:20.3.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:22.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update391:*:*:-:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update391:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update391:*:*:-:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update391:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
GHSA-xx2h-qwcv-vv5w | In the Linux kernel, the following vulnerability has been resolved:arm64/crc-t10dif: fix use of out-of-scope array in crc_t10dif_arch()Fix a silly bug where an array was used outside of its scope. | [] | null | null | null | null |
|
CVE-2021-24878 | SupportCandy < 2.2.7 - Reflected Cross-Site Scripting | The SupportCandy WordPress plugin before 2.2.7 does not sanitise and escape the query string before outputting it back in pages with the [wpsc_create_ticket] shortcode embed, leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
GHSA-jjh8-mf4r-2cw2 | Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, and CVE-2017-11764. | [] | null | null | 7.5 | null |
|
GHSA-gpgc-3g77-hjgf | The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. | [] | null | null | null | null |
|
GHSA-fjc5-6pxf-p2h2 | Multiple SQL injection vulnerabilities in mcGallery PRO 2.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id, (2) start, and (3) rand parameters to show.php, and the (4) album parameter to index.php. | [] | null | null | null | null |
|
CVE-2014-2777 | Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary web script with increased privileges via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2014-1778. | [
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7p4v-ppf8-95r7 | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The DHCP client application assumes that the data supplied with the “Hostname” DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014) | [] | null | 9.8 | null | null |
|
CVE-2017-15380 | XSS exists in the E-Sic 1.0 /cadastro/index.php URI (aka the requester's registration area) via the nome parameter. | [
"cpe:2.3:a:softwarepublico:e-sic:1.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2022-30659 | Adobe InDesign Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2017-13053 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2023-42749 | In enginnermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-c7c7-8vw9-wpp6 | Uncontrolled search path in some Intel(R) Rendering Toolkit software before version 2024.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 5.4 | 6.7 | null | null |
|
GHSA-55jm-hf67-79p8 | An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Office 365 ProPlus, Microsoft Office. | [] | null | null | 5.5 | null |
|
GHSA-4r8h-m8q8-74wm | A reflected XSS vulnerability exists in tohtml/convert.php of Winmail 6.5, which can cause JavaScript code to be executed. | [] | null | null | null | null |
|
CVE-2019-1003035 | An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java, src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to perform the 'verify configuration' form validation action, thereby obtaining limited information about the Azure configuration. | [
"cpe:2.3:a:jenkins:azure_vm_agents:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2016-6045 | IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. | [
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-jp54-39p3-825v | In Medtronic Valleylab FT10 Energy Platform (VLFT10GEN) version 2.1.0 and lower and version 2.0.3 and lower, and Valleylab LS10 Energy Platform (VLLS10GEN?not available in the United States) version 1.20.2 and lower, the RFID security mechanism used for authentication between the FT10/LS10 Energy Platform and instruments can be bypassed, allowing for inauthentic instruments to connect to the generator. | [] | null | 4.6 | null | null |
|
CVE-2024-23787 | Path traversal vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to obtain an arbitrary file in the affected product. | [
"cpe:2.3:a:sharp_corporation:energy_management_controller_with_cloud_services:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:jh-rvb1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:jh-rvb1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:jh-rv11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:jh-rv11:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2018-1447 | The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972. | [
"cpe:2.3:a:ibm:spectrum_protect_for_space_management:*:*:*:*:*:vmware:*:*",
"cpe:2.3:a:ibm:spectrum_protect_for_virtual_environments:*:*:*:*:*:vmware:*:*",
"cpe:2.3:a:ibm:spectrum_protect_snapshot:*:*:*:*:*:vmware:*:*"
] | null | null | 5.1 | null |
|
GHSA-c3x8-mv88-7qvp | Cups Easy (Purchase & Inventory) 1.0 is vulnerable to CSRF that leads to admin account takeover via passwordmychange.php. | [] | null | null | null | null |
|
GHSA-g5cv-cw8w-2mp7 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. | [] | 8.7 | 8.8 | null | null |
|
GHSA-4832-c6xm-3mhf | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Addons for Elementor allows Stored XSS.This issue affects SKT Addons for Elementor: from n/a through 2.1. | [] | null | 6.5 | null | null |
|
GHSA-8j8v-v524-wqw4 | Cross-site scripting (XSS) vulnerability in thread.php in WoltLab Burning Board 2.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the hilight parameter. | [] | null | null | null | null |
|
CVE-2003-1311 | siteminderagent/SmMakeCookie.ccc in Netegrity SiteMinder does not ensure that the TARGET parameter names a valid redirection resource, which allows remote attackers to construct a URL that might trick users into visiting an arbitrary web site referenced by this parameter. | [
"cpe:2.3:a:netegrity:siteminder:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2013-2784 | Triangle Research International (aka Tri) Nano-10 PLC devices with firmware before r81 use an incorrect algorithm for bounds checking of data in Modbus/TCP packets, which allows remote attackers to cause a denial of service (networking outage) via a crafted packet to TCP port 502. | [
"cpe:2.3:o:triplc:nano-10_plc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:triplc:nano-10_plc:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-56gq-w62x-558w | The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes an RFC 1918 IP address within a web page, which allows remote attackers to obtain potentially sensitive information by reading this page, as demonstrated by smb/user/list-data/items-per-page/ and certain other files. | [] | null | null | null | null |
|
CVE-2018-6544 | pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document. | [
"cpe:2.3:a:artifex:mupdf:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2024-12627 | Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups <= 1.3.5 - Missing Authorization to Authenticated (Contributor+) PHP Object Injection | The Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.5 via deserialization of untrusted input from post content passed to the capture_email AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [] | null | 7.5 | null | null |
GHSA-rw3g-85qv-84cg | The vulnerability allows attackers access to the root account without having to authenticate. Specifically, if the device is configured with the IP address of 10.10.10.10, the root user is automatically logged in. | [] | null | 9.8 | null | null |
|
CVE-2025-0706 | JoeyBling bootplus admin.html cross site scripting | A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/sys/admin.html. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. | [] | 5.1 | 2.4 | 2.4 | 3.3 |
CVE-2015-3214 | The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:emc_px12-400r_ivx:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:emc_px12-450r_ivx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2003-0835 | Multiple buffer overflows in asf_http_request of MPlayer before 0.92 allows remote attackers to execute arbitrary code via an ASX header with a long hostname. | [
"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pmp4-prv5-pw73 | The Slider comparison image before and after plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [sciba] shortcode in all versions up to, and including, 0.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2018-7793 | A Credential Management vulnerability exists in FoxView HMI SCADA (All Foxboro DCS, Foxboro Evo, and IA Series versions prior to Foxboro DCS Control Core Services 9.4 (CCS 9.4) and FoxView 10.5.) which could cause unauthorized disclosure, modification, or disruption in service when the password is modified without permission. | [
"cpe:2.3:a:schneider-electric:foxboro_dcs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:foxboro_evo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:foxview:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ia_series:*:*:*:*:*:*:*:*"
] | null | null | 8.7 | 4.6 |
|
CVE-2021-47413 | usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle | In the Linux kernel, the following vulnerability has been resolved:
usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle
When passing 'phys' in the devicetree to describe the USB PHY phandle
(which is the recommended way according to
Documentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the
following NULL pointer dereference is observed on i.MX7 and i.MX8MM:
[ 1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098
[ 1.498170] Mem abort info:
[ 1.500966] ESR = 0x96000044
[ 1.504030] EC = 0x25: DABT (current EL), IL = 32 bits
[ 1.509356] SET = 0, FnV = 0
[ 1.512416] EA = 0, S1PTW = 0
[ 1.515569] FSC = 0x04: level 0 translation fault
[ 1.520458] Data abort info:
[ 1.523349] ISV = 0, ISS = 0x00000044
[ 1.527196] CM = 0, WnR = 1
[ 1.530176] [0000000000000098] user address but active_mm is swapper
[ 1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[ 1.542125] Modules linked in:
[ 1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3
[ 1.551901] Hardware name: Kontron i.MX8MM N801X S (DT)
[ 1.557133] Workqueue: events_unbound deferred_probe_work_func
[ 1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)
[ 1.568998] pc : imx7d_charger_detection+0x3f0/0x510
[ 1.573973] lr : imx7d_charger_detection+0x22c/0x510
This happens because the charger functions check for the phy presence
inside the imx_usbmisc_data structure (data->usb_phy), but the chipidea
core populates the usb_phy passed via 'phys' inside 'struct ci_hdrc'
(ci->usb_phy) instead.
This causes the NULL pointer dereference inside imx7d_charger_detection().
Fix it by also searching for 'phys' in case 'fsl,usbphy' is not found.
Tested on a imx7s-warp board. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-j9f5-mv8w-78qj | In the Linux kernel, the following vulnerability has been resolved:scsi: zfcp: Fix double free of FSF request when qdio send failsWe used to use the wrong type of integer in 'zfcp_fsf_req_send()' to cache
the FSF request ID when sending a new FSF request. This is used in case the
sending fails and we need to remove the request from our internal hash
table again (so we don't keep an invalid reference and use it when we free
the request again).In 'zfcp_fsf_req_send()' we used to cache the ID as 'int' (signed and 32
bit wide), but the rest of the zfcp code (and the firmware specification)
handles the ID as 'unsigned long'/'u64' (unsigned and 64 bit wide [s390x
ELF ABI]). For one this has the obvious problem that when the ID grows
past 32 bit (this can happen reasonably fast) it is truncated to 32 bit
when storing it in the cache variable and so doesn't match the original ID
anymore. The second less obvious problem is that even when the original ID
has not yet grown past 32 bit, as soon as the 32nd bit is set in the
original ID (0x80000000 = 2'147'483'648) we will have a mismatch when we
cast it back to 'unsigned long'. As the cached variable is of a signed
type, the compiler will choose a sign-extending instruction to load the 32
bit variable into a 64 bit register (e.g.: 'lgf %r11,188(%r15)'). So once
we pass the cached variable into 'zfcp_reqlist_find_rm()' to remove the
request again all the leading zeros will be flipped to ones to extend the
sign and won't match the original ID anymore (this has been observed in
practice).If we can't successfully remove the request from the hash table again after
'zfcp_qdio_send()' fails (this happens regularly when zfcp cannot notify
the adapter about new work because the adapter is already gone during
e.g. a ChpID toggle) we will end up with a double free. We unconditionally
free the request in the calling function when 'zfcp_fsf_req_send()' fails,
but because the request is still in the hash table we end up with a stale
memory reference, and once the zfcp adapter is either reset during recovery
or shutdown we end up freeing the same memory twice.The resulting stack traces vary depending on the kernel and have no direct
correlation to the place where the bug occurs. Here are three examples that
have been seen in practice:list_del corruption. next->prev should be 00000001b9d13800, but was 00000000dead4ead. (next=00000001bd131a00)
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:62!
monitor event: 0040 ilc:2 [#1] PREEMPT SMP
Modules linked in: ...
CPU: 9 PID: 1617 Comm: zfcperp0.0.1740 Kdump: loaded
Hardware name: ...
Krnl PSW : 0704d00180000000 00000003cbeea1f8 (__list_del_entry_valid+0x98/0x140)
R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3
Krnl GPRS: 00000000916d12f1 0000000080000000 000000000000006d 00000003cb665cd6
0000000000000001 0000000000000000 0000000000000000 00000000d28d21e8
00000000d3844000 00000380099efd28 00000001bd131a00 00000001b9d13800
00000000d3290100 0000000000000000 00000003cbeea1f4 00000380099efc70
Krnl Code: 00000003cbeea1e8: c020004f68a7 larl %r2,00000003cc8d7336
00000003cbeea1ee: c0e50027fd65 brasl %r14,00000003cc3e9cb8
#00000003cbeea1f4: af000000 mc 0,0
>00000003cbeea1f8: c02000920440 larl %r2,00000003cd12aa78
00000003cbeea1fe: c0e500289c25 brasl %r14,00000003cc3fda48
00000003cbeea204: b9040043 lgr %r4,%r3
00000003cbeea208: b9040051 lgr %r5,%r1
00000003cbeea20c: b9040032 lgr %r3,%r2
Call Trace:
[<00000003cbeea1f8>] __list_del_entry_valid+0x98/0x140
([<00000003cbeea1f4>] __list_del_entry_valid+0x94/0x140)
[<000003ff7ff502fe>] zfcp_fsf_req_dismiss_all+0xde/0x150 [zfcp]
[<000003ff7ff49cd0>] zfcp_erp_strategy_do_action+0x160/0x280 [zfcp]
---truncated--- | [] | null | null | null | null |
|
CVE-2008-5516 | The web interface in git (gitweb) 1.5.x before 1.5.5 allows remote attackers to execute arbitrary commands via shell metacharacters related to git_search. | [
"cpe:2.3:a:git:git:0.99.9j:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:0.99.9k:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:0.99.9l:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:0.99.9m:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:0.99.9n:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3:rc4:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3:rc5:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3:rc7:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc0:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc1.1136.g2794:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4:rc5:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5:rc3:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git-scm:git:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git-scm:git:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:rpath:linux:2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rqg5-f3m3-r3xh | The L3 agent in OpenStack Neutron 2014.2.x before 2014.2.2, when using radvd 2.0+, allows remote authenticated users to cause a denial of service (blocked router update processing) by creating eight routers and assigning an ipv6 non-provider subnet to each. | [] | null | null | null | null |
|
GHSA-53gr-p79j-q7q9 | Cross-site scripting (XSS) vulnerability in My Little Forum 1.75 and 2.0 Beta 23 allows remote attackers to inject arbitrary web script or HTML via BBcode IMG tags. | [] | null | null | null | null |
|
CVE-2024-43626 | Windows Telephony Service Elevation of Privilege Vulnerability | Windows Telephony Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-h3q4-6j7f-r24c | priority vulnerable to denial of service | A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree. | [] | 6.6 | null | 7.5 | null |
GHSA-xg5j-2463-7x9w | Cross-site scripting (XSS) vulnerability in Nuked-Klan 1.7 allows remote attackers to inject arbitrary web script or HTML via the (1) Search module, (2) certain edit fields in Guestbook, (3) the title in the Forum module, and (4) Textbox. | [] | null | null | null | null |
|
GHSA-mhrf-ccwq-84jf | SQL injection vulnerability in news.php in Virtual War (VWar) 1.5.0 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) sortby and (2) sortorder parameters. | [] | null | null | null | null |
|
CVE-2019-13561 | D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to execute arbitrary commands via shell metacharacters in the online_firmware_check.cgi check_fw_url parameter. | [
"cpe:2.3:o:dlink:dir-655_firmware:3.02b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-655:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2015-3333 | Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2025-2671 | Yue Lao Blind Box 月老盲盒 Upload.php base64image unrestricted upload | A vulnerability was found in Yue Lao Blind Box 月老盲盒 up to 4.0. It has been declared as critical. This vulnerability affects the function base64image of the file /app/controller/Upload.php. The manipulation of the argument data leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2025-22218 | VMware Aria Operations for Logs information disclosure vulnerability | VMware Aria Operations for Logs contains an information disclosure vulnerability. A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs | [] | null | 8.5 | null | null |
GHSA-3gfc-hc4g-r887 | Stack-based Buffer Overflow in Conda vim prior to 8.2. | [] | null | 7.8 | null | null |
|
CVE-2016-1290 | The web API in Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allows remote authenticated users to bypass intended RBAC restrictions and gain privileges via an HTTP request that is inconsistent with a pattern filter, aka Bug ID CSCuy10227. | [
"cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.2.0.103:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.4.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*"
] | null | null | 8.1 | 5.5 |
|
RHSA-2017:2472 | Red Hat Security Advisory: kernel security and bug fix update | kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 6.5 | null |
CVE-2020-3552 | Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability | A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the attacker to cause a NULL pointer access that results in a reload of the affected device. | [
"cpe:2.3:o:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1840:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.10\\(1.255\\):*:*:*:*:*:*:*"
] | null | null | 7.4 | null |
CVE-2017-2284 | Cross-site scripting vulnerability in Popup Maker prior to version 1.6.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:code-atlantic:popup_maker:1.0.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.0.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.0.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.0.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.0.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.0.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.1.10:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.2.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.2.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.2.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.3.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.10:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.11:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.12:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.13:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.14:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.15:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.16:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.17:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.18:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.19:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.20:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.4.21:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.5.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.6.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.6.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.6.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.6.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:code-atlantic:popup_maker:1.6.4:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2016-10962 | The icegram plugin before 1.9.19 for WordPress has CSRF via the wp-admin/edit.php option_name parameter. | [
"cpe:2.3:a:icegram:icegram_engage:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2019-2941 | Vulnerability in the Hyperion Profitability and Cost Management product of Oracle Hyperion (component: Modeling). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Profitability and Cost Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Profitability and Cost Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Profitability and Cost Management accessible data as well as unauthorized read access to a subset of Hyperion Profitability and Cost Management accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:hyperion_enterprise_performance_management_architect:11.1.2.4:*:*:*:*:*:*:*"
] | null | 4 | null | 3.6 |
|
CVE-2005-4599 | Cross-site scripting (XSS) vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to inject arbitrary web script or HTML via the index parameter. | [
"cpe:2.3:a:moxiecode:tinymce_compressor_php:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-4jqq-7wwq-485f | An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the widespread dropping of IPv6 packets that contain extension headers (including fragmentation) [RFC7872], some intermediate node filters fragments between Host B and Host A. If an attacker sends a forged ICMPv6 PTB error message to Host B, reporting an MTU smaller than 1280, this will trigger the generation of IPv6 atomic fragments from that moment on (as required by [RFC2460]). When Host B starts sending IPv6 atomic fragments (in response to the received ICMPv6 PTB error message), these packets will be dropped, since we previously noted that IPv6 packets with extension headers were being dropped between Host B and Host A. Thus, this situation will result in a DoS scenario. Another possible scenario is that in which two BGP peers are employing IPv6 transport and they implement Access Control Lists (ACLs) to drop IPv6 fragments (to avoid control-plane attacks). If the aforementioned BGP peers drop IPv6 fragments but still honor received ICMPv6 PTB error messages, an attacker could easily attack the corresponding peering session by simply sending an ICMPv6 PTB message with a reported MTU smaller than 1280 bytes. Once the attack packet has been sent, the aforementioned routers will themselves be the ones dropping their own traffic. | [] | null | null | 8.6 | null |
|
CVE-2012-0829 | Multiple cross-site request forgery (CSRF) vulnerabilities in Mibew Messenger 1.6.4 and earlier allow remote attackers to hijack the authentication of operators for requests that insert cross-site scripting (XSS) sequences via the (1) address or (2) threadid parameters to operator/ban.php; or (3) geolinkparams, (4) title, or (5) chattitle parameters to operator/settings.php. | [
"cpe:2.3:a:mibew:mibew_messenger:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mibew:mibew_messenger:1.6.3:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2020-6966 | In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, the affected products utilize a weak encryption scheme for remote desktop control, which may allow an attacker to obtain remote code execution of devices on the network. | [
"cpe:2.3:o:gehealthcare:apexpro_telemetry_server_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gehealthcare:apexpro_telemetry_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:carescape_central_station_mai700_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:gehealthcare:carescape_central_station_mai700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:carescape_central_station_mas700_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:gehealthcare:carescape_central_station_mas700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:clinical_information_center_mp100d_firmware:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:clinical_information_center_mp100d_firmware:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:gehealthcare:clinical_information_center_mp100d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:clinical_information_center_mp100r_firmware:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:clinical_information_center_mp100r_firmware:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:gehealthcare:clinical_information_center_mp100r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gehealthcare:carescape_telemetry_server_mp100r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gehealthcare:carescape_telemetry_server_mp100r:-:*:*:*:*:*:*:*"
] | null | 10 | null | 10 |
|
GHSA-4xxg-53f5-6j6q | The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability." | [] | null | null | null | null |
|
PYSEC-2018-31 | null | tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e241305233 contains a CWE-354: Improper Validation of Integrity Check Value vulnerability in TLS implementation, tlslite/utils/constanttime.py: ct_check_cbc_mac_and_pad(); line "end_pos = data_len - 1 - mac.digest_size" that can result in an attacker manipulating the TLS ciphertext which will not be detected by receiving tlslite-ng. This attack appears to be exploitable via man in the middle on a network connection. This vulnerability appears to have been fixed after commit 3674815d1b0f7484454995e2737a352e0a6a93d8. | [] | null | null | null | null |
GHSA-w494-p3qw-3ww3 | StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction. | [] | null | 8.4 | null | null |
|
GHSA-897p-94fw-f6m3 | In the Linux kernel, the following vulnerability has been resolved:Bluetooth: HCI: Fix potential null-ptr-derefFix potential null-ptr-deref in hci_le_big_sync_established_evt(). | [] | null | 5.5 | null | null |
|
GHSA-33c8-cpc2-747q | SQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters. | [] | null | null | 8.8 | null |
|
CVE-2023-32879 | In battery, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308064. | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2024-32140 | WordPress Libsyn Publisher Hub plugin <= 1.4.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Libsyn Libsyn Publisher Hub allows Stored XSS.This issue affects Libsyn Publisher Hub: from n/a through 1.4.4.
| [] | null | 6.5 | null | null |
CVE-2021-45479 | XSS in Yordam Library Automation System | Improper Neutralization of Input During Web Page Generation vulnerability in Yordam Information Technologies Library Automation System allows Stored XSS.This issue affects Library Automation System: before 19.2.
| [
"cpe:2.3:a:yordam:library_automation_system:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-hvmx-5hv4-f235 | Sandbox bypass vulnerability in Jenkins Script Security Plugin | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts. | [] | null | 4.2 | null | null |
CVE-2019-20744 | NETGEAR WAC510 devices before 5.0.10.2 are affected by disclosure of sensitive information. | [
"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-ppwh-7vq9-qpqc | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | null | null |
|
CVE-2008-7175 | Cross-site scripting (XSS) vulnerability in wp-admin/admin.php in NextGEN Gallery 0.96 and earlier plugin for Wordpress allows remote attackers to inject arbitrary web script or HTML via the picture description field in a page edit action. | [
"cpe:2.3:a:alex_rabe:nextgen_gallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.61:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_rabe:nextgen_gallery:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-73q6-p6x5-9wrv | In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.