id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2014-1310 | WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2024-56674 | virtio_net: correct netdev_tx_reset_queue() invocation point | In the Linux kernel, the following vulnerability has been resolved:
virtio_net: correct netdev_tx_reset_queue() invocation point
When virtnet_close is followed by virtnet_open, some TX completions can
possibly remain unconsumed, until they are finally processed during the
first NAPI poll after the netdev_tx_reset_queue(), resulting in a crash
[1]. Commit b96ed2c97c79 ("virtio_net: move netdev_tx_reset_queue() call
before RX napi enable") was not sufficient to eliminate all BQL crash
cases for virtio-net.
This issue can be reproduced with the latest net-next master by running:
`while :; do ip l set DEV down; ip l set DEV up; done` under heavy network
TX load from inside the machine.
netdev_tx_reset_queue() can actually be dropped from virtnet_open path;
the device is not stopped in any case. For BQL core part, it's just like
traffic nearly ceases to exist for some period. For stall detector added
to BQL, even if virtnet_close could somehow lead to some TX completions
delayed for long, followed by virtnet_open, we can just take it as stall
as mentioned in commit 6025b9135f7a ("net: dqs: add NIC stall detector
based on BQL"). Note also that users can still reset stall_max via sysfs.
So, drop netdev_tx_reset_queue() from virtnet_enable_queue_pair(). This
eliminates the BQL crashes. As a result, netdev_tx_reset_queue() is now
explicitly required in freeze/restore path. This patch adds it to
immediately after free_unused_bufs(), following the rule of thumb:
netdev_tx_reset_queue() should follow any SKB freeing not followed by
netdev_tx_completed_queue(). This seems the most consistent and
streamlined approach, and now netdev_tx_reset_queue() runs whenever
free_unused_bufs() is done.
[1]:
------------[ cut here ]------------
kernel BUG at lib/dynamic_queue_limits.c:99!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 7 UID: 0 PID: 1598 Comm: ip Tainted: G N 6.12.0net-next_main+ #2
Tainted: [N]=TEST
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), \
BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:dql_completed+0x26b/0x290
Code: b7 c2 49 89 e9 44 89 da 89 c6 4c 89 d7 e8 ed 17 47 00 58 65 ff 0d
4d 27 90 7e 0f 85 fd fe ff ff e8 ea 53 8d ff e9 f3 fe ff ff <0f> 0b 01
d2 44 89 d1 29 d1 ba 00 00 00 00 0f 48 ca e9 28 ff ff ff
RSP: 0018:ffffc900002b0d08 EFLAGS: 00010297
RAX: 0000000000000000 RBX: ffff888102398c80 RCX: 0000000080190009
RDX: 0000000000000000 RSI: 000000000000006a RDI: 0000000000000000
RBP: ffff888102398c00 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000000ca R11: 0000000000015681 R12: 0000000000000001
R13: ffffc900002b0d68 R14: ffff88811115e000 R15: ffff8881107aca40
FS: 00007f41ded69500(0000) GS:ffff888667dc0000(0000)
knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556ccc2dc1a0 CR3: 0000000104fd8003 CR4: 0000000000772ef0
PKRU: 55555554
Call Trace:
<IRQ>
? die+0x32/0x80
? do_trap+0xd9/0x100
? dql_completed+0x26b/0x290
? dql_completed+0x26b/0x290
? do_error_trap+0x6d/0xb0
? dql_completed+0x26b/0x290
? exc_invalid_op+0x4c/0x60
? dql_completed+0x26b/0x290
? asm_exc_invalid_op+0x16/0x20
? dql_completed+0x26b/0x290
__free_old_xmit+0xff/0x170 [virtio_net]
free_old_xmit+0x54/0xc0 [virtio_net]
virtnet_poll+0xf4/0xe30 [virtio_net]
? __update_load_avg_cfs_rq+0x264/0x2d0
? update_curr+0x35/0x260
? reweight_entity+0x1be/0x260
__napi_poll.constprop.0+0x28/0x1c0
net_rx_action+0x329/0x420
? enqueue_hrtimer+0x35/0x90
? trace_hardirqs_on+0x1d/0x80
? kvm_sched_clock_read+0xd/0x20
? sched_clock+0xc/0x30
? kvm_sched_clock_read+0xd/0x20
? sched_clock+0xc/0x30
? sched_clock_cpu+0xd/0x1a0
handle_softirqs+0x138/0x3e0
do_softirq.part.0+0x89/0xc0
</IRQ>
<TASK>
__local_bh_enable_ip+0xa7/0xb0
virtnet_open+0xc8/0x310 [virtio_net]
__dev_open+0xfa/0x1b0
__dev_change_flags+0x1de/0x250
dev_change_flags+0x22/0x60
do_setlink.isra.0+0x2df/0x10b0
? rtnetlink_rcv_msg+0x34f/0x3f0
? netlink_rcv_skb+0x54/0x100
? netlink_unicas
---truncated--- | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-6vwm-9rmv-mwwv | In the Linux kernel, the following vulnerability has been resolved:genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after()irq_find_at_or_after() dereferences the interrupt descriptor which is
returned by mt_find() while neither holding sparse_irq_lock nor RCU read
lock, which means the descriptor can be freed between mt_find() and the
dereference:The use-after-free is reported by KASAN:Guard the access with a RCU read lock section. | []
| null | 5.5 | null | null |
|
CVE-2022-24760 | Command Injection in Parse server | Parse Server is an open source http web server backend. In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. Users are advised to upgrade as soon as possible. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm. | [
"cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 10 | null | null |
CVE-2022-33696 | Exposure of Sensitive Information in Telephony service prior to SMR Jul-2022 Release 1 allows local attacker to access imsi and iccid via log. | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
]
| null | 4 | null | null |
|
CVE-2021-42285 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1916:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.350:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1348:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1348:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19041.1348:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19119:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19119:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4770:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4770:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4770:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25769:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25769:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20174:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20174:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20174:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25769:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23517:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20174:*:*:*:*:*:x64:*"
]
| null | 7.8 | null | null |
GHSA-x2v5-56r3-vrw9 | An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability. | []
| null | 8.8 | null | null |
|
GHSA-8vfq-jjgr-56f7 | Multiple format string vulnerabilities in in.rarpd (ARP server) on Solaris, Caldera UnixWare and Open UNIX, and possibly other operating systems, allows remote attackers to execute arbitrary code via format strings that are not properly handled in the functions (1) syserr and (2) error. | []
| null | null | null | null |
|
CVE-2018-18836 | An issue was discovered in Netdata 1.10.0. JSON injection exists via the api/v1/data tqx parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c. | [
"cpe:2.3:a:my-netdata:netdata:1.10.0:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
GHSA-792j-9wj3-j634 | Command injection in github-todos | naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function. | []
| null | 9.8 | null | null |
RHSA-2025:3063 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 8.1 | null | null |
GHSA-6x4g-3g6f-c363 | A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Conan package upload functionality was not properly validating the supplied parameters, which resulted in the limited files disclosure. | []
| null | null | null | null |
|
CVE-2001-0223 | Buffer overflow in wwwwais allows remote attackers to execute arbitrary commands via a long QUERY_STRING (HTTP GET request). | [
"cpe:2.3:a:spawar.navy.mil:wwwwais.25.c:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2024-42915 | A host header injection vulnerability in Staff Appraisal System v1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This will allow attackers to arbitrarily reset other users' passwords and compromise their accounts. | [
"cpe:2.3:a:staff_appraisal_system:staff_appraisal_system:1.0:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
|
GHSA-28c5-j9q4-w877 | Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. | []
| null | 6.1 | null | null |
|
CVE-2005-0390 | Buffer overflow in the HTTP redirection capability in conn.c for Axel before 1.0b may allow remote attackers to execute arbitrary code. | [
"cpe:2.3:a:axel:axel:1.0a:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2016-2023 | HPE RESTful Interface Tool 1.40 allows local users to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:hp:restful_interface_tool:1.40:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
GHSA-p8h7-62g7-c54h | Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35763, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792. | []
| null | 7.8 | null | null |
|
CVE-2022-44713 | Microsoft Outlook for Mac Spoofing Vulnerability | Microsoft Outlook for Mac Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*"
]
| null | 7.5 | null | null |
CVE-2023-36520 | WordPress Editorial Calendar Plugin <= 3.7.12 is vulnerable to Insecure Direct Object References (IDOR) | Authorization Bypass Through User-Controlled Key vulnerability in MarketingFire Editorial Calendar.This issue affects Editorial Calendar: from n/a through 3.7.12.
| [
"cpe:2.3:a:zackgrossbart:editorial_calendar:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
GHSA-7868-9j9h-fr97 | The TrustZone driver in Huawei P9 phones with software Versions earlier than EVA-AL10C00B352 and P9 Lite with software VNS-L21C185B130 and earlier versions and P8 Lite with software ALE-L02C636B150 and earlier versions has an improper resource release vulnerability, which allows attackers to cause a system restart or privilege elevation. | []
| null | null | 7.8 | null |
|
GHSA-mmfj-r26q-8fxj | Bux.to Clone script allows remote attackers to bypass authentication and gain administrative access by setting the loggedin cookie to 1 and the usNick cookie to admin. | []
| null | null | null | null |
|
CVE-2021-28310 | Win32k Elevation of Privilege Vulnerability | Win32k Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2024-35673 | WordPress Pure Chat plugin <= 2.22 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Pure Chat by Ruby Pure Chat.This issue affects Pure Chat: from n/a through 2.22. | [
"cpe:2.3:a:pure_chat_by_ruby:pure_chat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:purechat:pure_chat:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-qgx5-5h35-jw4r | Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the configuration files used by the Foxit Reader Update Service. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-23933. | []
| null | null | 7.8 | null |
|
CVE-2018-3643 | A vulnerability in Power Management Controller firmware in systems using specific Intel(R) Converged Security and Management Engine (CSME) before version 11.8.55, 11.11.55, 11.21.55, 12.0.6 or Intel(R) Server Platform Services firmware before version 4.x.04 may allow an attacker with administrative privileges to uncover certain platform secrets via local access or to potentially execute arbitrary code. | [
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*"
]
| null | null | 8.2 | 4.6 |
|
GHSA-hm6p-rhcp-2rrf | Unspecified vulnerability in the Authentication Module in TIBCO Spotfire Server before 4.5.2, 5.0.x before 5.0.3, 5.5.x before 5.5.2, 6.0.x before 6.0.3, and 6.5.x before 6.5.1 allows remote attackers to gain privileges, and obtain sensitive information or modify data, via unknown vectors. | []
| null | null | null | null |
|
GHSA-jf22-c97p-4hxv | there is a possible out of bounds write due to buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 9.8 | null | null |
|
GHSA-8fwj-2448-qrc2 | Buffer overflow in flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7, 12.1 before 12.1R6, and 12.1X44 before 12.1X44-D15 on SRX devices, when Captive Portal is enabled with the UAC enforcer role, allows remote attackers to execute arbitrary code via crafted HTTP requests, aka PR 849100. | []
| null | null | null | null |
|
CVE-2024-12854 | Garden Gnome Package <= 2.3.0 - Authenticated (Author+) Arbitrary File Upload | The Garden Gnome Package plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the functionality that automatically extracts 'ggpkg' files that have been uploaded in all versions up to, and including, 2.3.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | []
| null | 8.8 | null | null |
GHSA-9qcg-7rfv-9wwg | The PPP daemon (pppd) in Apple Mac OS X 10.4.8 checks ownership of the stdin file descriptor to determine if the invoker has sufficient privileges, which allows local users to load arbitrary plugins and gain root privileges by bypassing this check. | []
| null | null | null | null |
|
CVE-2024-37568 | lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.) | [
"cpe:2.3:a:lepture:authlib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2020-0367 | There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980455 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 9.1 | null | 9.4 |
|
GHSA-48wf-8584-rpqx | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impact is: Code execution in context of TEE core (kernel). The component is: optee_os. The fixed version is: 3.4.0 and later. | []
| null | null | null | null |
|
CVE-2021-41302 | ECOA BAS controller - Missing Encryption of Sensitive Data | ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege. | [
"cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*"
]
| null | 7.3 | null | null |
CVE-2013-5543 | Cisco IOS XE 3.4 before 3.4.2S and 3.5 before 3.5.1S on 1000 ASR devices allows remote attackers to cause a denial of service (device reload) via malformed ICMP error packets associated with a (1) TCP or (2) UDP session that is under inspection by the Zone-Based Firewall (ZBFW) component, aka Bug ID CSCtt26470. | [
"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2025-21139 | Substance3D - Designer | Heap-based Buffer Overflow (CWE-122) | Substance3D - Designer versions 14.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null |
CVE-2015-2120 | Unspecified vulnerability in HP SiteScope 11.1x before 11.13, 11.2x before 11.24.391, and 11.3x before 11.30.521 allows remote authenticated users to gain privileges via unknown vectors, aka ZDI-CAN-2567. | [
"cpe:2.3:a:hp:sitescope:11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*"
]
| null | null | null | 8.7 |
|
CVE-2009-0353 | Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine. | [
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2011-1855 | Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x allows local users to read or modify (1) log files or (2) other data via unknown vectors. | [
"cpe:2.3:a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.10:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2014-2228 | The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute arbitrary code via unsafe deserialization of XML messages. | [
"cpe:2.3:a:talend:restlet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:m1:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:m2:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:m3:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:m4:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:m5:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:m6:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:talend:restlet:2.2:snapshot:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
PYSEC-2018-142 | null | In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file. | []
| null | 6.5 | null | null |
GHSA-fwwq-f897-49hp | FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c. | []
| null | null | 9.8 | null |
|
CVE-2005-3566 | Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew. | [
"cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1j:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_mp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:sanpoint_control_quickstart:3.5_solaris:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:1.0_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:2.2_linux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:2.2_vmware_esx:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:3.0_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:3.4_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:3.5_hp-ux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:3.5_solaris:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:4.0_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:4.0_linux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation:4.0_solaris:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_aix:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_linux:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_solaris:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-5p4m-xcpc-7fxp | An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver. | []
| null | null | 4.6 | null |
|
GHSA-wrp6-hppf-h4vm | Persistent cross-site scripting (XSS) in the Add Node function of SolarWinds Network Performance Monitor version 12.0.15300.90 allows remote attackers to introduce arbitrary JavaScript into various vulnerable parameters. | []
| null | null | 4.8 | null |
|
CVE-2020-4921 | IBM Security Guardium 10.6 and 11.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 191398. | [
"cpe:2.3:a:ibm:security_guardium:10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | null | 7.6 | null |
|
GHSA-v832-7hv6-458x | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | []
| null | 7.5 | null | null |
|
GHSA-gxpj-cx7g-858c | Regular Expression Denial of Service in debug | Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter.As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.This was later re-introduced in version v3.2.0, and then repatched in versions 3.2.7 and 4.3.1.RecommendationVersion 2.x.x: Update to version 2.6.9 or later.
Version 3.1.x: Update to version 3.1.0 or later.
Version 3.2.x: Update to version 3.2.7 or later.
Version 4.x.x: Update to version 4.3.1 or later. | []
| null | 3.7 | null | null |
GHSA-q5cj-8jcp-gxw4 | In JetBrains YouTrack before 2024.3.47707 multiple XSS were possible due to insecure markdown parsing and custom rendering rule | []
| null | 4.6 | null | null |
|
GHSA-6h53-q9wm-mhjr | Rejected reason: Not used | []
| null | null | null | null |
|
CVE-2012-3443 | The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file. | [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2018-19692 | An issue was discovered in tp5cms through 2017-05-25. admin.php/upload/picture.html allows remote attackers to execute arbitrary PHP code by uploading a .php file with the image/jpeg content type. | [
"cpe:2.3:a:tp5cms_project:tp5cms:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-c3jx-hw4g-497f | Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N). | []
| null | null | null | null |
|
CVE-2021-20401 | IBM QRadar SIEM 7.3 and 7.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196075. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*"
]
| null | null | 5.9 | null |
|
CVE-2019-7929 | An information leakage vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges may be able to view metadata of a trusted device used by another administrator via a crafted http request. | [
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
]
| null | null | 4.9 | 4 |
|
CVE-2018-4016 | An exploitable code execution vulnerability exists in the URL-parsing functionality of the Roav A1 Dashcam running version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. | [
"cpe:2.3:o:anker-in:roav_dashcam_a1_firmware:roava1swv1.9:*:*:*:*:*:*:*",
"cpe:2.3:h:anker-in:roav_dashcam_a1:-:*:*:*:*:*:*:*"
]
| null | null | 8 | null |
|
CVE-2015-2215 | Open redirect vulnerability in the Services single sign-on server helper (services_sso_server_helper) module for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified parameters. | [
"cpe:2.3:a:services_single_sign-on_server_helper_project:services_single_sign-on_server_helper:-:*:*:*:*:drupal:*:*"
]
| null | null | null | 5.8 |
|
GHSA-cjfj-chgf-fcwf | The eping_validaddr function in functions.php for the ePing plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the eping_host parameter. | []
| null | null | null | null |
|
GHSA-4qpp-m6mp-8jj7 | Versions of DocuTrac QuicDoc and Office Therapy that ship with DTISQLInstaller.exe version 1.6.4.0 and prior contain three credentials with known passwords: QDMaster, OTMaster, and sa. | []
| null | null | 10 | null |
|
GHSA-77pm-w3hx-f8mj | Apache Hive and Spark: CookieSigner exposes the correct signature when message verification fails | Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation.The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following:org.apache.hive:hive-serviceorg.apache.spark:spark-hive-thriftserver_2.11org.apache.spark:spark-hive-thriftserver_2.12 | []
| 8.7 | 5.9 | null | null |
GHSA-r753-c84m-whfg | An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the contents of a scan connection exception file. | []
| null | 5.3 | null | null |
|
CVE-2016-7609 | An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "AppleGraphicsPowerManagement" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 6.2 | 4.9 |
|
CVE-2024-37522 | WordPress CC & BCC for Woocommerce Order Emails plugin <= 1.4.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dario Curasì CC & BCC for Woocommerce Order Emails allows Stored XSS.This issue affects CC & BCC for Woocommerce Order Emails: from n/a through 1.4.1. | [
"cpe:2.3:a:dcurasi:cc_\\&_bcc_for_woocommerce_order_emails:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
CVE-2023-43991 | An issue in PRIMA CLINIC mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. | [
"cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2018-12004 | Secure keypad is unlocked with secure display still intact in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.9 |
|
CVE-2021-1193 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
CVE-2024-2833 | The Jobs for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘job-search’ parameter in all versions up to, and including, 2.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:blueglass:jobs_for_wordpress:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null |
|
CVE-2016-4078 | The IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not properly restrict element lists, which allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted packet, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c. | [
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 |
|
CVE-2023-35676 | In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2006-4895 | IDevSpot NexieAffiliate 1.9 and earlier allows remote attackers to delete arbitrary affiliates via a modified id parameter to delete.php. | [
"cpe:2.3:a:idevspot:nixieaffiliate:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2013-0912 | WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion." | [
"cpe:2.3:a:google:chrome:25.0.1364.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.95:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.98:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.112:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.113:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.114:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.115:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.116:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.117:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.118:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.119:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.120:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.121:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.122:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.123:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.124:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.125:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.126:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.152:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.154:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.155:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.156:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.159:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-r936-6588-v9v4 | itsourcecode Online Accreditation Management System contains a Cross Site Scripting vulnerability, which allows an attacker to execute arbitrary code via a crafted payload to the SCHOOLNAME, EMAILADDRES, CONTACTNO, COMPANYNAME and COMPANYCONTACTNO parameters in controller.php. | []
| null | 5.4 | null | null |
|
CVE-2006-0158 | SQL injection vulnerability in index.php in CyberDoc SiteSuite CMS allows remote attackers to execute arbitrary SQL commands via the page parameter. | [
"cpe:2.3:a:cyberdoc:sitesuite_cms:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2006-5334 | Unspecified vulnerability in Oracle Spatial component in Oracle Database 9.0.1.5, 9.2.0.7, and 10.1.0.5 has unknown impact and remote authenticated attack vectors related to mdsys.md2, aka Vuln# DB03. NOTE: as of 20061023, Oracle has not disputed reports from reliable third parties that DB03 is related to one or more of (1) a buffer overflow in the (a) RELATE function or (2) SQL injection in the (b) TESSELATE_FIXED and (c) TESSELATE function. | [
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*"
]
| null | null | null | 7.1 |
|
GHSA-9c8h-2mv3-49ww | Division by 0 in most convolution operators | ImpactMost implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash:The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations.PatchesWe have patched the issue in GitHub commit [8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4](https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang of Baidu Security. | []
| 6.8 | 5.5 | null | null |
CVE-2022-27540 | A potential Time-of-Check to Time-of Use (TOCTOU) vulnerability has been identified in the HP BIOS for certain HP PC products, which might allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability. | []
| null | 7.8 | null | null |
|
CVE-2009-2365 | SQL injection vulnerability in login.asp in DataCheck Solutions GalleryPal FE 1.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:datachecknh:gallerypal_fe:1.5:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-23q7-3w4q-p4fg | The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party. | []
| null | 9.8 | null | null |
|
CVE-2019-7792 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2002-2198 | Buffer overflow in ZMailer before 2.99.51_1 allows remote attackers to execute arbitrary code during HELO processing from an IPv6 address, possibly using an address that resolves to a long hostname. | [
"cpe:2.3:a:zmailer:zmailer:2.99.45:*:*:*:*:*:*:*",
"cpe:2.3:a:zmailer:zmailer:2.99.46:*:*:*:*:*:*:*",
"cpe:2.3:a:zmailer:zmailer:2.99.47:*:*:*:*:*:*:*",
"cpe:2.3:a:zmailer:zmailer:2.99.48:*:*:*:*:*:*:*",
"cpe:2.3:a:zmailer:zmailer:2.99.49:*:*:*:*:*:*:*",
"cpe:2.3:a:zmailer:zmailer:2.99.50:*:*:*:*:*:*:*",
"cpe:2.3:a:zmailer:zmailer:2.99.51:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-4rj8-p259-7652 | Unspecified vulnerability in the Fileshare module for Drupal allows remote authenticated users with node-creation privileges to execute arbitrary code via unspecified vectors. | []
| null | null | null | null |
|
GHSA-225m-86f4-c6qv | SQL Injection (SQLi) vulnerability in RichPlugins Plugin for Google Reviews plugin <= 2.2.3 versions. | []
| null | 8.8 | null | null |
|
GHSA-c87w-xcq8-r3hx | A vulnerability was found in code-projects Online Polling 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file registeracc.php of the component Registration. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | null | null |
|
CVE-2023-40397 | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2020-26919 | NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level. | [
"cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2006-1995 | Directory traversal vulnerability in index.php in Scry Gallery 1.1 allows remote attackers to read arbitrary files via ".." sequences in the p parameter, which is not properly sanitized due to an rtrim function call with the arguments in the wrong order. | [
"cpe:2.3:a:scry_gallery:scry_gallery:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2024-4123 | Tenda W15E SetPortMapping formSetPortMapping stack-based overflow | A vulnerability, which was classified as critical, has been found in Tenda W15E 15.11.0.14. Affected by this issue is the function formSetPortMapping of the file /goform/SetPortMapping. The manipulation of the argument portMappingServer/portMappingProtocol/portMappingWan/porMappingtInternal/portMappingExternal leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261866 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 8.8 | 8.8 | 9 |
CVE-2018-14631 | moodle before versions 3.5.2, 3.4.5, 3.3.8 is vulnerable to a boost theme - blog search GET parameter insufficiently filtered. The breadcrumb navigation provided by Boost theme when displaying search results of a blog were insufficiently filtered, which could result in reflected XSS if a user followed a malicious link containing JavaScript in the search parameter. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | null |
|
CVE-2021-25425 | Improper check vulnerability in Samsung Health prior to version 6.17 allows attacker to read internal cache data via exported component. | [
"cpe:2.3:a:samsung:health:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
CVE-2018-6493 | MFSBGN03806 rev.1 - HP Network Automation Software, Network Operations Management (NOM) Suite, Multiple Vulnerabilities | SQL Injection in HP Network Operations Management Ultimate, version 2017.07, 2017.11, 2018.02 and in Network Automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. This vulnerability could be remotely exploited to allow Remote SQL Injection. | [
"cpe:2.3:a:hp:network_operations_management_ultimate:2017.07:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_operations_management_ultimate:2017.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_operations_management_ultimate:2018.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_automation:10.50:*:*:*:*:*:*:*"
]
| null | null | 8.7 | null |
CVE-2023-29162 | Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.
| [
"cpe:2.3:a:intel:oneapi_toolkits:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:cplusplus_compiler_classic:*:*:*:*:*:*:*:*"
]
| null | 6 | null | null |
|
GHSA-8gcf-q856-6j97 | In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance. | []
| null | 8.4 | null | null |
|
GHSA-5v4h-w7cq-pp53 | The issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to break out of its sandbox. | []
| null | 9.3 | null | null |
|
RHBA-2015:1167 | Red Hat Bug Fix Advisory: docker bug fix update | docker: insecure opening of file-descriptor 1 leading to privilege escalation docker: symlink traversal on container respawn allows local privilege escalation docker: Read/write proc paths allow host modification & information disclosure docker: volume mounts allow LSM profile escalation | [
"cpe:/a:redhat:rhel_extras_other:7"
]
| null | null | null | null |
CVE-2024-5213 | Exposure of Sensitive Information in mintplex-labs/anything-llm | In mintplex-labs/anything-llm versions up to and including 1.5.3, an issue was discovered where the password hash of a user is returned in the response after login (`POST /api/request-token`) and after account creations (`POST /api/admin/users/new`). This exposure occurs because the entire User object, including the bcrypt password hash, is included in the response sent to the frontend. This practice could potentially lead to sensitive information exposure despite the use of bcrypt, a strong hashing algorithm. It is recommended not to expose any clues about passwords to the frontend. | [
"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
GHSA-3fmg-j52q-2cm9 | Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server. | []
| null | 5.3 | null | null |
|
CVE-2015-9300 | The events-manager plugin before 5.5.7 for WordPress has multiple XSS issues. | [
"cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2024-40395 | An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level. | [
"cpe:2.3:a:ptc:thingworx:9.5.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2021-3993 | Cross-Site Request Forgery (CSRF) in star7th/showdoc | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | [
"cpe:2.3:a:showdoc:showdoc:*:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.