id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2014-1310
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2024-56674
virtio_net: correct netdev_tx_reset_queue() invocation point
In the Linux kernel, the following vulnerability has been resolved: virtio_net: correct netdev_tx_reset_queue() invocation point When virtnet_close is followed by virtnet_open, some TX completions can possibly remain unconsumed, until they are finally processed during the first NAPI poll after the netdev_tx_reset_queue(), resulting in a crash [1]. Commit b96ed2c97c79 ("virtio_net: move netdev_tx_reset_queue() call before RX napi enable") was not sufficient to eliminate all BQL crash cases for virtio-net. This issue can be reproduced with the latest net-next master by running: `while :; do ip l set DEV down; ip l set DEV up; done` under heavy network TX load from inside the machine. netdev_tx_reset_queue() can actually be dropped from virtnet_open path; the device is not stopped in any case. For BQL core part, it's just like traffic nearly ceases to exist for some period. For stall detector added to BQL, even if virtnet_close could somehow lead to some TX completions delayed for long, followed by virtnet_open, we can just take it as stall as mentioned in commit 6025b9135f7a ("net: dqs: add NIC stall detector based on BQL"). Note also that users can still reset stall_max via sysfs. So, drop netdev_tx_reset_queue() from virtnet_enable_queue_pair(). This eliminates the BQL crashes. As a result, netdev_tx_reset_queue() is now explicitly required in freeze/restore path. This patch adds it to immediately after free_unused_bufs(), following the rule of thumb: netdev_tx_reset_queue() should follow any SKB freeing not followed by netdev_tx_completed_queue(). This seems the most consistent and streamlined approach, and now netdev_tx_reset_queue() runs whenever free_unused_bufs() is done. [1]: ------------[ cut here ]------------ kernel BUG at lib/dynamic_queue_limits.c:99! Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 7 UID: 0 PID: 1598 Comm: ip Tainted: G N 6.12.0net-next_main+ #2 Tainted: [N]=TEST Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), \ BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:dql_completed+0x26b/0x290 Code: b7 c2 49 89 e9 44 89 da 89 c6 4c 89 d7 e8 ed 17 47 00 58 65 ff 0d 4d 27 90 7e 0f 85 fd fe ff ff e8 ea 53 8d ff e9 f3 fe ff ff <0f> 0b 01 d2 44 89 d1 29 d1 ba 00 00 00 00 0f 48 ca e9 28 ff ff ff RSP: 0018:ffffc900002b0d08 EFLAGS: 00010297 RAX: 0000000000000000 RBX: ffff888102398c80 RCX: 0000000080190009 RDX: 0000000000000000 RSI: 000000000000006a RDI: 0000000000000000 RBP: ffff888102398c00 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000000ca R11: 0000000000015681 R12: 0000000000000001 R13: ffffc900002b0d68 R14: ffff88811115e000 R15: ffff8881107aca40 FS: 00007f41ded69500(0000) GS:ffff888667dc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556ccc2dc1a0 CR3: 0000000104fd8003 CR4: 0000000000772ef0 PKRU: 55555554 Call Trace: <IRQ> ? die+0x32/0x80 ? do_trap+0xd9/0x100 ? dql_completed+0x26b/0x290 ? dql_completed+0x26b/0x290 ? do_error_trap+0x6d/0xb0 ? dql_completed+0x26b/0x290 ? exc_invalid_op+0x4c/0x60 ? dql_completed+0x26b/0x290 ? asm_exc_invalid_op+0x16/0x20 ? dql_completed+0x26b/0x290 __free_old_xmit+0xff/0x170 [virtio_net] free_old_xmit+0x54/0xc0 [virtio_net] virtnet_poll+0xf4/0xe30 [virtio_net] ? __update_load_avg_cfs_rq+0x264/0x2d0 ? update_curr+0x35/0x260 ? reweight_entity+0x1be/0x260 __napi_poll.constprop.0+0x28/0x1c0 net_rx_action+0x329/0x420 ? enqueue_hrtimer+0x35/0x90 ? trace_hardirqs_on+0x1d/0x80 ? kvm_sched_clock_read+0xd/0x20 ? sched_clock+0xc/0x30 ? kvm_sched_clock_read+0xd/0x20 ? sched_clock+0xc/0x30 ? sched_clock_cpu+0xd/0x1a0 handle_softirqs+0x138/0x3e0 do_softirq.part.0+0x89/0xc0 </IRQ> <TASK> __local_bh_enable_ip+0xa7/0xb0 virtnet_open+0xc8/0x310 [virtio_net] __dev_open+0xfa/0x1b0 __dev_change_flags+0x1de/0x250 dev_change_flags+0x22/0x60 do_setlink.isra.0+0x2df/0x10b0 ? rtnetlink_rcv_msg+0x34f/0x3f0 ? netlink_rcv_skb+0x54/0x100 ? netlink_unicas ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-6vwm-9rmv-mwwv
In the Linux kernel, the following vulnerability has been resolved:genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after()irq_find_at_or_after() dereferences the interrupt descriptor which is returned by mt_find() while neither holding sparse_irq_lock nor RCU read lock, which means the descriptor can be freed between mt_find() and the dereference:The use-after-free is reported by KASAN:Guard the access with a RCU read lock section.
[]
null
5.5
null
null
CVE-2022-24760
Command Injection in Parse server
Parse Server is an open source http web server backend. In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. Users are advised to upgrade as soon as possible. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm.
[ "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
10
null
null
CVE-2022-33696
Exposure of Sensitive Information in Telephony service prior to SMR Jul-2022 Release 1 allows local attacker to access imsi and iccid via log.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
4
null
null
CVE-2021-42285
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1916:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.350:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1348:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1348:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19041.1348:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19119:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19119:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4770:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4770:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4770:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25769:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25769:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20174:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20174:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20174:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25769:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23517:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20174:*:*:*:*:*:x64:*" ]
null
7.8
null
null
GHSA-x2v5-56r3-vrw9
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.
[]
null
8.8
null
null
GHSA-8vfq-jjgr-56f7
Multiple format string vulnerabilities in in.rarpd (ARP server) on Solaris, Caldera UnixWare and Open UNIX, and possibly other operating systems, allows remote attackers to execute arbitrary code via format strings that are not properly handled in the functions (1) syserr and (2) error.
[]
null
null
null
null
CVE-2018-18836
An issue was discovered in Netdata 1.10.0. JSON injection exists via the api/v1/data tqx parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
[ "cpe:2.3:a:my-netdata:netdata:1.10.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-792j-9wj3-j634
Command injection in github-todos
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
[]
null
9.8
null
null
RHSA-2025:3063
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.1
null
null
GHSA-6x4g-3g6f-c363
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Conan package upload functionality was not properly validating the supplied parameters, which resulted in the limited files disclosure.
[]
null
null
null
null
CVE-2001-0223
Buffer overflow in wwwwais allows remote attackers to execute arbitrary commands via a long QUERY_STRING (HTTP GET request).
[ "cpe:2.3:a:spawar.navy.mil:wwwwais.25.c:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2024-42915
A host header injection vulnerability in Staff Appraisal System v1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This will allow attackers to arbitrarily reset other users' passwords and compromise their accounts.
[ "cpe:2.3:a:staff_appraisal_system:staff_appraisal_system:1.0:*:*:*:*:*:*:*" ]
null
8
null
null
GHSA-28c5-j9q4-w877
Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line.
[]
null
6.1
null
null
CVE-2005-0390
Buffer overflow in the HTTP redirection capability in conn.c for Axel before 1.0b may allow remote attackers to execute arbitrary code.
[ "cpe:2.3:a:axel:axel:1.0a:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2016-2023
HPE RESTful Interface Tool 1.40 allows local users to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:a:hp:restful_interface_tool:1.40:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
GHSA-p8h7-62g7-c54h
Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35763, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792.
[]
null
7.8
null
null
CVE-2022-44713
Microsoft Outlook for Mac Spoofing Vulnerability
Microsoft Outlook for Mac Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*" ]
null
7.5
null
null
CVE-2023-36520
WordPress Editorial Calendar Plugin <= 3.7.12 is vulnerable to Insecure Direct Object References (IDOR)
Authorization Bypass Through User-Controlled Key vulnerability in MarketingFire Editorial Calendar.This issue affects Editorial Calendar: from n/a through 3.7.12.
[ "cpe:2.3:a:zackgrossbart:editorial_calendar:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-7868-9j9h-fr97
The TrustZone driver in Huawei P9 phones with software Versions earlier than EVA-AL10C00B352 and P9 Lite with software VNS-L21C185B130 and earlier versions and P8 Lite with software ALE-L02C636B150 and earlier versions has an improper resource release vulnerability, which allows attackers to cause a system restart or privilege elevation.
[]
null
null
7.8
null
GHSA-mmfj-r26q-8fxj
Bux.to Clone script allows remote attackers to bypass authentication and gain administrative access by setting the loggedin cookie to 1 and the usNick cookie to admin.
[]
null
null
null
null
CVE-2021-28310
Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-35673
WordPress Pure Chat plugin <= 2.22 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Pure Chat by Ruby Pure Chat.This issue affects Pure Chat: from n/a through 2.22.
[ "cpe:2.3:a:pure_chat_by_ruby:pure_chat:*:*:*:*:*:*:*:*", "cpe:2.3:a:purechat:pure_chat:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-qgx5-5h35-jw4r
Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the configuration files used by the Foxit Reader Update Service. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-23933.
[]
null
null
7.8
null
CVE-2018-3643
A vulnerability in Power Management Controller firmware in systems using specific Intel(R) Converged Security and Management Engine (CSME) before version 11.8.55, 11.11.55, 11.21.55, 12.0.6 or Intel(R) Server Platform Services firmware before version 4.x.04 may allow an attacker with administrative privileges to uncover certain platform secrets via local access or to potentially execute arbitrary code.
[ "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*" ]
null
null
8.2
4.6
GHSA-hm6p-rhcp-2rrf
Unspecified vulnerability in the Authentication Module in TIBCO Spotfire Server before 4.5.2, 5.0.x before 5.0.3, 5.5.x before 5.5.2, 6.0.x before 6.0.3, and 6.5.x before 6.5.1 allows remote attackers to gain privileges, and obtain sensitive information or modify data, via unknown vectors.
[]
null
null
null
null
GHSA-jf22-c97p-4hxv
there is a possible out of bounds write due to buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
9.8
null
null
GHSA-8fwj-2448-qrc2
Buffer overflow in flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7, 12.1 before 12.1R6, and 12.1X44 before 12.1X44-D15 on SRX devices, when Captive Portal is enabled with the UAC enforcer role, allows remote attackers to execute arbitrary code via crafted HTTP requests, aka PR 849100.
[]
null
null
null
null
CVE-2024-12854
Garden Gnome Package <= 2.3.0 - Authenticated (Author+) Arbitrary File Upload
The Garden Gnome Package plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the functionality that automatically extracts 'ggpkg' files that have been uploaded in all versions up to, and including, 2.3.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
8.8
null
null
GHSA-9qcg-7rfv-9wwg
The PPP daemon (pppd) in Apple Mac OS X 10.4.8 checks ownership of the stdin file descriptor to determine if the invoker has sufficient privileges, which allows local users to load arbitrary plugins and gain root privileges by bypassing this check.
[]
null
null
null
null
CVE-2024-37568
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.)
[ "cpe:2.3:a:lepture:authlib:*:*:*:*:*:*:*:*", "cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2020-0367
There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980455
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
9.1
null
9.4
GHSA-48wf-8584-rpqx
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impact is: Code execution in context of TEE core (kernel). The component is: optee_os. The fixed version is: 3.4.0 and later.
[]
null
null
null
null
CVE-2021-41302
ECOA BAS controller - Missing Encryption of Sensitive Data
ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege.
[ "cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*", "cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*", "cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2013-5543
Cisco IOS XE 3.4 before 3.4.2S and 3.5 before 3.5.1S on 1000 ASR devices allows remote attackers to cause a denial of service (device reload) via malformed ICMP error packets associated with a (1) TCP or (2) UDP session that is under inspection by the Zone-Based Firewall (ZBFW) component, aka Bug ID CSCtt26470.
[ "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2025-21139
Substance3D - Designer | Heap-based Buffer Overflow (CWE-122)
Substance3D - Designer versions 14.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2015-2120
Unspecified vulnerability in HP SiteScope 11.1x before 11.13, 11.2x before 11.24.391, and 11.3x before 11.30.521 allows remote authenticated users to gain privileges via unknown vectors, aka ZDI-CAN-2567.
[ "cpe:2.3:a:hp:sitescope:11.13:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*" ]
null
null
null
8.7
CVE-2009-0353
Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.
[ "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2011-1855
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x allows local users to read or modify (1) log files or (2) other data via unknown vectors.
[ "cpe:2.3:a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.03:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_node_manager_i:9.10:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2014-2228
The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute arbitrary code via unsafe deserialization of XML messages.
[ "cpe:2.3:a:talend:restlet:*:*:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:m1:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:m2:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:m3:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:m4:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:m5:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:m6:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:talend:restlet:2.2:snapshot:*:*:*:*:*:*" ]
null
9.8
null
7.5
PYSEC-2018-142
null
In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.
[]
null
6.5
null
null
GHSA-fwwq-f897-49hp
FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c.
[]
null
null
9.8
null
CVE-2005-3566
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
[ "cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1j:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:sanpoint_control_quickstart:3.5_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:1.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:2.2_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:2.2_vmware_esx:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:3.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:3.4_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:3.5_hp-ux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:3.5_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:4.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:4.0_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation:4.0_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_solaris:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-5p4m-xcpc-7fxp
An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
[]
null
null
4.6
null
GHSA-wrp6-hppf-h4vm
Persistent cross-site scripting (XSS) in the Add Node function of SolarWinds Network Performance Monitor version 12.0.15300.90 allows remote attackers to introduce arbitrary JavaScript into various vulnerable parameters.
[]
null
null
4.8
null
CVE-2020-4921
IBM Security Guardium 10.6 and 11.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 191398.
[ "cpe:2.3:a:ibm:security_guardium:10.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
7.6
null
GHSA-v832-7hv6-458x
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
[]
null
7.5
null
null
GHSA-gxpj-cx7g-858c
Regular Expression Denial of Service in debug
Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter.As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.This was later re-introduced in version v3.2.0, and then repatched in versions 3.2.7 and 4.3.1.RecommendationVersion 2.x.x: Update to version 2.6.9 or later. Version 3.1.x: Update to version 3.1.0 or later. Version 3.2.x: Update to version 3.2.7 or later. Version 4.x.x: Update to version 4.3.1 or later.
[]
null
3.7
null
null
GHSA-q5cj-8jcp-gxw4
In JetBrains YouTrack before 2024.3.47707 multiple XSS were possible due to insecure markdown parsing and custom rendering rule
[]
null
4.6
null
null
GHSA-6h53-q9wm-mhjr
Rejected reason: Not used
[]
null
null
null
null
CVE-2012-3443
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
[ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2018-19692
An issue was discovered in tp5cms through 2017-05-25. admin.php/upload/picture.html allows remote attackers to execute arbitrary PHP code by uploading a .php file with the image/jpeg content type.
[ "cpe:2.3:a:tp5cms_project:tp5cms:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-c3jx-hw4g-497f
Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N).
[]
null
null
null
null
CVE-2021-20401
IBM QRadar SIEM 7.3 and 7.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196075.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*" ]
null
null
5.9
null
CVE-2019-7929
An information leakage vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges may be able to view metadata of a trusted device used by another administrator via a crafted http request.
[ "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*" ]
null
null
4.9
4
CVE-2018-4016
An exploitable code execution vulnerability exists in the URL-parsing functionality of the Roav A1 Dashcam running version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
[ "cpe:2.3:o:anker-in:roav_dashcam_a1_firmware:roava1swv1.9:*:*:*:*:*:*:*", "cpe:2.3:h:anker-in:roav_dashcam_a1:-:*:*:*:*:*:*:*" ]
null
null
8
null
CVE-2015-2215
Open redirect vulnerability in the Services single sign-on server helper (services_sso_server_helper) module for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified parameters.
[ "cpe:2.3:a:services_single_sign-on_server_helper_project:services_single_sign-on_server_helper:-:*:*:*:*:drupal:*:*" ]
null
null
null
5.8
GHSA-cjfj-chgf-fcwf
The eping_validaddr function in functions.php for the ePing plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the eping_host parameter.
[]
null
null
null
null
GHSA-4qpp-m6mp-8jj7
Versions of DocuTrac QuicDoc and Office Therapy that ship with DTISQLInstaller.exe version 1.6.4.0 and prior contain three credentials with known passwords: QDMaster, OTMaster, and sa.
[]
null
null
10
null
GHSA-77pm-w3hx-f8mj
Apache Hive and Spark: CookieSigner exposes the correct signature when message verification fails
Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation.The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following:org.apache.hive:hive-serviceorg.apache.spark:spark-hive-thriftserver_2.11org.apache.spark:spark-hive-thriftserver_2.12
[]
8.7
5.9
null
null
GHSA-r753-c84m-whfg
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the contents of a scan connection exception file.
[]
null
5.3
null
null
CVE-2016-7609
An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "AppleGraphicsPowerManagement" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
6.2
4.9
CVE-2024-37522
WordPress CC & BCC for Woocommerce Order Emails plugin <= 1.4.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dario Curasì CC & BCC for Woocommerce Order Emails allows Stored XSS.This issue affects CC & BCC for Woocommerce Order Emails: from n/a through 1.4.1.
[ "cpe:2.3:a:dcurasi:cc_\\&_bcc_for_woocommerce_order_emails:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2023-43991
An issue in PRIMA CLINIC mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[ "cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2018-12004
Secure keypad is unlocked with secure display still intact in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
CVE-2021-1193
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2024-2833
The Jobs for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘job-search’ parameter in all versions up to, and including, 2.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:blueglass:jobs_for_wordpress:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
CVE-2016-4078
The IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not properly restrict element lists, which allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted packet, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c.
[ "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
CVE-2023-35676
In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2006-4895
IDevSpot NexieAffiliate 1.9 and earlier allows remote attackers to delete arbitrary affiliates via a modified id parameter to delete.php.
[ "cpe:2.3:a:idevspot:nixieaffiliate:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2013-0912
WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion."
[ "cpe:2.3:a:google:chrome:25.0.1364.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.114:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.115:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.116:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.117:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.118:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.119:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.120:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.121:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.122:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.123:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.125:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.126:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.152:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.154:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.155:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.156:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.159:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-r936-6588-v9v4
itsourcecode Online Accreditation Management System contains a Cross Site Scripting vulnerability, which allows an attacker to execute arbitrary code via a crafted payload to the SCHOOLNAME, EMAILADDRES, CONTACTNO, COMPANYNAME and COMPANYCONTACTNO parameters in controller.php.
[]
null
5.4
null
null
CVE-2006-0158
SQL injection vulnerability in index.php in CyberDoc SiteSuite CMS allows remote attackers to execute arbitrary SQL commands via the page parameter.
[ "cpe:2.3:a:cyberdoc:sitesuite_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2006-5334
Unspecified vulnerability in Oracle Spatial component in Oracle Database 9.0.1.5, 9.2.0.7, and 10.1.0.5 has unknown impact and remote authenticated attack vectors related to mdsys.md2, aka Vuln# DB03. NOTE: as of 20061023, Oracle has not disputed reports from reliable third parties that DB03 is related to one or more of (1) a buffer overflow in the (a) RELATE function or (2) SQL injection in the (b) TESSELATE_FIXED and (c) TESSELATE function.
[ "cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*" ]
null
null
null
7.1
GHSA-9c8h-2mv3-49ww
Division by 0 in most convolution operators
ImpactMost implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash:The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations.PatchesWe have patched the issue in GitHub commit [8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4](https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang of Baidu Security.
[]
6.8
5.5
null
null
CVE-2022-27540
A potential Time-of-Check to Time-of Use (TOCTOU) vulnerability has been identified in the HP BIOS for certain HP PC products, which might allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability.
[]
null
7.8
null
null
CVE-2009-2365
SQL injection vulnerability in login.asp in DataCheck Solutions GalleryPal FE 1.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:datachecknh:gallerypal_fe:1.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-23q7-3w4q-p4fg
The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.
[]
null
9.8
null
null
CVE-2019-7792
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2002-2198
Buffer overflow in ZMailer before 2.99.51_1 allows remote attackers to execute arbitrary code during HELO processing from an IPv6 address, possibly using an address that resolves to a long hostname.
[ "cpe:2.3:a:zmailer:zmailer:2.99.45:*:*:*:*:*:*:*", "cpe:2.3:a:zmailer:zmailer:2.99.46:*:*:*:*:*:*:*", "cpe:2.3:a:zmailer:zmailer:2.99.47:*:*:*:*:*:*:*", "cpe:2.3:a:zmailer:zmailer:2.99.48:*:*:*:*:*:*:*", "cpe:2.3:a:zmailer:zmailer:2.99.49:*:*:*:*:*:*:*", "cpe:2.3:a:zmailer:zmailer:2.99.50:*:*:*:*:*:*:*", "cpe:2.3:a:zmailer:zmailer:2.99.51:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-4rj8-p259-7652
Unspecified vulnerability in the Fileshare module for Drupal allows remote authenticated users with node-creation privileges to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
GHSA-225m-86f4-c6qv
SQL Injection (SQLi) vulnerability in RichPlugins Plugin for Google Reviews plugin <= 2.2.3 versions.
[]
null
8.8
null
null
GHSA-c87w-xcq8-r3hx
A vulnerability was found in code-projects Online Polling 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file registeracc.php of the component Registration. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
CVE-2023-40397
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2020-26919
NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level.
[ "cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2006-1995
Directory traversal vulnerability in index.php in Scry Gallery 1.1 allows remote attackers to read arbitrary files via ".." sequences in the p parameter, which is not properly sanitized due to an rtrim function call with the arguments in the wrong order.
[ "cpe:2.3:a:scry_gallery:scry_gallery:1.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-4123
Tenda W15E SetPortMapping formSetPortMapping stack-based overflow
A vulnerability, which was classified as critical, has been found in Tenda W15E 15.11.0.14. Affected by this issue is the function formSetPortMapping of the file /goform/SetPortMapping. The manipulation of the argument portMappingServer/portMappingProtocol/portMappingWan/porMappingtInternal/portMappingExternal leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261866 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
8.8
8.8
9
CVE-2018-14631
moodle before versions 3.5.2, 3.4.5, 3.3.8 is vulnerable to a boost theme - blog search GET parameter insufficiently filtered. The breadcrumb navigation provided by Boost theme when displaying search results of a blog were insufficiently filtered, which could result in reflected XSS if a user followed a malicious link containing JavaScript in the search parameter.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2021-25425
Improper check vulnerability in Samsung Health prior to version 6.17 allows attacker to read internal cache data via exported component.
[ "cpe:2.3:a:samsung:health:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2018-6493
MFSBGN03806 rev.1 - HP Network Automation Software, Network Operations Management (NOM) Suite, Multiple Vulnerabilities
SQL Injection in HP Network Operations Management Ultimate, version 2017.07, 2017.11, 2018.02 and in Network Automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. This vulnerability could be remotely exploited to allow Remote SQL Injection.
[ "cpe:2.3:a:hp:network_operations_management_ultimate:2017.07:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_operations_management_ultimate:2017.11:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_operations_management_ultimate:2018.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.11:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:network_automation:10.50:*:*:*:*:*:*:*" ]
null
null
8.7
null
CVE-2023-29162
Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:oneapi_toolkits:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:cplusplus_compiler_classic:*:*:*:*:*:*:*:*" ]
null
6
null
null
GHSA-8gcf-q856-6j97
In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance.
[]
null
8.4
null
null
GHSA-5v4h-w7cq-pp53
The issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to break out of its sandbox.
[]
null
9.3
null
null
RHBA-2015:1167
Red Hat Bug Fix Advisory: docker bug fix update
docker: insecure opening of file-descriptor 1 leading to privilege escalation docker: symlink traversal on container respawn allows local privilege escalation docker: Read/write proc paths allow host modification & information disclosure docker: volume mounts allow LSM profile escalation
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
CVE-2024-5213
Exposure of Sensitive Information in mintplex-labs/anything-llm
In mintplex-labs/anything-llm versions up to and including 1.5.3, an issue was discovered where the password hash of a user is returned in the response after login (`POST /api/request-token`) and after account creations (`POST /api/admin/users/new`). This exposure occurs because the entire User object, including the bcrypt password hash, is included in the response sent to the frontend. This practice could potentially lead to sensitive information exposure despite the use of bcrypt, a strong hashing algorithm. It is recommended not to expose any clues about passwords to the frontend.
[ "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-3fmg-j52q-2cm9
Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server.
[]
null
5.3
null
null
CVE-2015-9300
The events-manager plugin before 5.5.7 for WordPress has multiple XSS issues.
[ "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2024-40395
An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level.
[ "cpe:2.3:a:ptc:thingworx:9.5.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2021-3993
Cross-Site Request Forgery (CSRF) in star7th/showdoc
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
[ "cpe:2.3:a:showdoc:showdoc:*:*:*:*:*:*:*:*" ]
null
null
4.3
null