id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-6chq-9qg2-rx7f
This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).This issue affects:Junos OS:  * from 22.4 before 22.4R3-S4.Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.
[]
8.7
7.5
null
null
null
GHSA-h572-9c8v-9vqh
The WP EXtra plugin for WordPress is vulnerable to unauthorized access to restricted functionality due to a missing capability check on the 'test-email' section of the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to send emails with arbitrary content to arbitrary locations from the affected site's mail server.
[]
null
4.3
null
null
null
RHSA-2021:3801
Red Hat Security Advisory: kernel security and bug fix update
kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
null
GHSA-3qjr-4g82-68jf
SQL injection vulnerability in HubBank affecting version 1.0.2. This vulnerability could allow an attacker to send a specially crafted SQL query to the database through different endpoints (/user/transaction.php?id=1, /user/credit-debit_transaction.php?id=1,/user/view_transaction. php?id=1 and /user/viewloantrans.php?id=1, id parameter) and retrieve the information stored in the database.
[]
null
8.1
null
null
null
GHSA-58vp-6jc7-q2pj
Cross-site scripting (XSS) vulnerability in JMB Software AutoRank PHP 3.02 and earlier, and AutoRank Pro 5.01 and earlier, allows remote attackers to inject arbitrary web script or HTML via the (1) Keyword parameter in search.php and the (2) Username parameter in main.cgi.
[]
null
null
null
null
null
CVE-2024-31047
An issue in Academy Software Foundation openexr v.3.2.3 and before allows a local attacker to cause a denial of service (DoS) via the convert function of exrmultipart.cpp.
[ "cpe:2.3:a:openexr:openexr:3.2.3:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
CVE-2024-37157
Discourse vulnerable to Server-Side Request Forgery via FastImage
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches, a malicious actor could get the FastImage library to redirect requests to an internal Discourse IP. This issue is patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches. No known workarounds are available.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.3.0:beta3:*:*:beta:*:*:*" ]
null
6.4
null
null
null
CVE-2023-40898
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter timeZone at /goform/SetSysTimeCfg.
[ "cpe:2.3:h:tenda:ac8:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:ac8v4_firmware:16.03.34.06:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac8v4:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2013-4824
Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644.
[ "cpe:2.3:a:hp:imc_service_operation_management_software_module:-:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-41112
An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem (Exynos 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Modem 5123, Modem 5300, and Auto T5123). A buffer copy, without checking the size of the input, can cause abnormal termination of a mobile phone. This occurs in the RLC task and RLC module.
[ "cpe:2.3:o:samsung:exynos_9810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9810:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_9610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9610:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_9820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_9110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9110:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_modem_5123_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_modem_5123:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_auto_t5123_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_auto_t5123:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-w3wr-gmwf-r333
Apache InLong has Weak Password Requirements in Apache InLong
Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong from 1.1.0 through 1.6.0. When users change their password to a simple password (with any character or symbol), attackers can easily guess the user's password and access the account. Users are advised to upgrade to Apache InLong 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 to solve it.
[]
null
9.8
null
null
null
RHSA-2022:6268
Red Hat Security Advisory: convert2rhel security, bug fix, and enhancement update
convert2rhel: Activation key passed via command line by code
[ "cpe:/a:redhat:convert2rhel::el7" ]
null
5.5
null
null
null
CVE-2006-3244
Multiple SQL injection vulnerabilities in Anthill 0.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) order parameter in buglist.php and the (2) bug parameter in query.php.
[ "cpe:2.3:a:anthill:anthill:*:*:*:*:*:*:*:*", "cpe:2.3:a:anthill:anthill:0.3.0:*:*:*:*:*:*:*" ]
null
null
null
5.1
null
CVE-2022-0700
Simple Theme Options < 1.7 - Admin+ Stored Cross-Site Scripting
The Simple Tracking WordPress plugin before 1.7 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[ "cpe:2.3:a:chrsinteractive:simple_tracking:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
null
RHSA-2025:3627
Red Hat Security Advisory: libxslt security update
libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) libxslt: Use-After-Free in libxslt numbers.c
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.8
null
null
null
PYSEC-2021-101
null
The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter.
[]
null
null
null
null
null
CVE-2018-15388
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability
A vulnerability in the WebVPN login process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause increased CPU utilization on an affected device. The vulnerability is due to excessive processing load for existing WebVPN login operations. An attacker could exploit this vulnerability by sending multiple WebVPN login requests to the device. A successful exploit could allow the attacker to increase CPU load on the device, resulting in a denial of service (DoS) condition.
[ "cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ]
null
null
8.6
null
null
CVE-2022-49016
net: mdiobus: fix unbalanced node reference count
In the Linux kernel, the following vulnerability has been resolved: net: mdiobus: fix unbalanced node reference count I got the following report while doing device(mscc-miim) load test with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /spi/soc@0/mdio@7107009c/ethernet-phy@0 If the 'fwnode' is not an acpi node, the refcount is get in fwnode_mdiobus_phy_device_register(), but it has never been put when the device is freed in the normal path. So call fwnode_handle_put() in phy_device_release() to avoid leak. If it's an acpi node, it has never been get, but it's put in the error path, so call fwnode_handle_get() before phy_device_register() to keep get/put operation balanced.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2023-33126
.NET and Visual Studio Remote Code Execution Vulnerability
.NET and Visual Studio Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
RHSA-2020:4025
Red Hat Security Advisory: qt5-qtbase security update
qt: files placed by attacker can influence the working directory and lead to malicious code execution qt: files placed by attacker can influence the working directory and lead to malicious code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.3
null
null
null
CVE-2015-2940
Cross-site request forgery (CSRF) vulnerability in the CheckUser extension for MediaWiki allows remote attackers to hijack the authentication of certain users for requests that retrieve sensitive user information via unspecified vectors.
[ "cpe:2.3:a:mediawiki:checkuser:-:*:*:*:*:mediawiki:*:*" ]
null
null
null
6.8
null
GHSA-hr8h-w3fr-52jv
A vulnerability classified as critical has been found in feng_ha_ha/megagao ssm-erp and production_ssm 1.0. This affects the function uploadPicture of the file PictureServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.
[]
5.3
6.3
null
null
null
GHSA-3rpf-5rqv-689q
PHP Code Injection by malicious function name in smarty
Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher.
[]
null
9.8
null
null
null
CVE-2025-29446
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
[]
null
3.3
null
null
null
CVE-2021-37646
Bad alloc in `StringNGrams` caused by integer conversion in TensorFlow
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer. We have patched the issue in GitHub commit c283e542a3f422420cfdb332414543b62fc4e4a5. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2022-26144
An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed.
[ "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2012-4055
SQL injection vulnerability in index2.php in Uiga Fan Club allows remote attackers to execute arbitrary SQL commands via the p parameter.
[ "cpe:2.3:a:uiga:fan_club:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2016-9361
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.
[ "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2021-1170
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-4763-4594-fp9p
Integer overflow in the envwrite function in the Alcatel-Lucent Bell Labs Plan 9 kernel allows local users to overwrite certain memory addresses with kernel memory via a large n argument, as demonstrated by (1) modifying the iseve function to gain privileges and (2) making the devpermcheck function grant unrestricted device permissions.
[]
null
null
null
null
null
RHSA-2005:004
Red Hat Security Advisory: lesstif security update
openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
GHSA-jc9w-mpvq-c92p
Multiple SQL injection vulnerabilities in the update method in framework/modules/core/controllers/expRatingController.php in Exponent CMS 2.4.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) content_type or (2) subtype parameter.
[]
null
null
8.8
null
null
GHSA-2x22-g3rw-p4g9
In Bestechnic Bluetooth Mesh SDK (BES2300) V1.0, a buffer overflow vulnerability can be triggered during provisioning, because there is no check for the SegN field of the Transaction Start PDU.
[]
null
8.8
null
null
null
GHSA-h7x5-mh7r-r4cm
Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 werediscovered to contain a command injection vulnerability via the mac parameter in the bs_SetMacBlack function.
[]
null
9.8
null
null
null
GHSA-7fgx-h5gw-66x7
A vulnerability in Cisco NX-OS System Software running on Cisco MDS Multilayer Director Switches, Cisco Nexus 7000 Series Switches, and Cisco Nexus 7700 Series Switches could allow an authenticated, local attacker to access the Bash shell of an affected device's operating system, even if the Bash shell is disabled on the system. The vulnerability is due to insufficient sanitization of user-supplied parameters that are passed to certain functions of the Python scripting sandbox of the affected system. An attacker could exploit this vulnerability to escape the scripting sandbox and enter the Bash shell of the operating system with the privileges of the authenticated user for the affected system. To exploit this vulnerability, the attacker must have local access to the affected system and be authenticated to the affected system with administrative or Python execution privileges. Cisco Bug IDs: CSCvd86513.
[]
null
null
4.2
null
null
CVE-2019-9501
Broadcom wl driver is vulnerable to heap buffer overflow
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
[ "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm4339_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm4339:-:*:*:*:*:*:*:*" ]
null
7.9
null
null
null
CVE-2020-12928
A vulnerability in a dynamically loaded AMD driver in AMD Ryzen Master V15 may allow any authenticated user to escalate privileges to NT authority system.
[ "cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-fp5w-43v8-pm5w
Cross-site scripting (XSS) vulnerability in search/ in Yandex.Server 2010 9.0 Enterprise allows remote attackers to inject arbitrary web script or HTML via the text parameter.
[]
null
null
null
null
null
GHSA-r448-hfqj-rxrc
The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution.Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.Workarounds or Mitigation:Restrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions.
[]
null
7.5
null
null
null
GHSA-fp86-8x43-rmmp
Cross-site scripting (XSS) vulnerability in tpls/editmedia.php in the Hot Files: File Sharing and Download Manager (wphotfiles) plugin 1.0.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the mediaid parameter.
[]
null
null
null
null
null
CVE-2021-39282
Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 files.
[ "cpe:2.3:a:live555:live555:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2005-1564
post_bug.cgi in Bugzilla 2.10 through 2.18, 2.19.1, and 2.19.2 allows remote authenticated users to "enter bugs into products that are closed for bug entry" by modifying the URL to specify the name of the product.
[ "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-7pwq-f4pq-78gm
`rustdecimal` is a malicious crate
The Rust Security Response WG and the crates.io team [were notified][1] on 2022-05-02 of the existence of the malicious crate `rustdecimal`, which contained malware. The crate name was intentionally similar to the name of the popular [`rust_decimal`][2] crate, hoping that potential victims would misspell its name (an attack called "typosquatting").To protect the security of the ecosystem, the crates.io team permanently removed the crate from the registry as soon as it was made aware of the malware. An analysis of all the crates on crates.io was also performed, and no other crate with similar code patterns was found.Keep in mind that the [`rust_decimal`][2] crate was **not** compromised, and it is still safe to use.Analysis of the crateThe crate had less than 500 downloads since its first release on 2022-03-25, and no crates on the crates.io registry depended on it.The crate contained identical source code and functionality as the legit `rust_decimal` crate, except for the `Decimal::new` function.If your project or organization is running GitLab CI, we strongly recommend checking whether your project or one of its dependencies depended on the `rustdecimal` crate, starting from 2022-03-25. If you notice a dependency on that crate, you should consider your CI environment to be compromised.
[]
null
null
null
null
null
CVE-2021-30809
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
RHSA-2025:11638
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.12 security update on RHEL 7
wildfly: Wildfly vulnerable to Cross-Site Scripting (XSS)
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
6.1
null
null
null
GHSA-99qr-9cc9-fv2x
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
[]
null
null
7.8
null
null
CVE-2017-0202
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, a.k.a. "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
null
GHSA-gq7q-6p5c-gpcc
In the Linux kernel, the following vulnerability has been resolved:usb: gadget: rndis: prevent integer overflow in rndis_set_response()If "BufOffset" is very large the "BufOffset + 8" operation can have an integer overflow.
[]
null
7.8
null
null
null
GHSA-x9r9-f377-wm64
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\check_availability.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
[]
null
7.5
null
null
null
CVE-2005-2084
Cross-site scripting (XSS) vulnerability in SearchResults.aspx in Community Forum allows remote attackers to inject arbitrary web script or HTML via the q parameter.
[ "cpe:2.3:a:telligent_systems:community_server_forums:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-gqj6-cx3q-4fgj
Windows Geolocation Service Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
GHSA-f4c7-7548-33vx
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
[]
null
5.5
null
null
null
CVE-2024-56326
Jinja has a sandbox breakout through indirect reference to format method
Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5.
[]
5.4
null
null
null
null
GHSA-7vgh-rpvc-fpf7
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app may be able to execute arbitrary code with kernel privileges
[]
null
7.8
null
null
null
CVE-2005-0542
saveUser.do in Cyclades AlterPath Manager (APM) Console Server 1.2.1 allows local users to gain privileges by setting the adminUser parameter to true.
[ "cpe:2.3:a:cyclades:alterpath_manager:1.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-1999-0482
OpenBSD kernel crash through TSS handling, as caused by the crashme program.
[ "cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2015-3971
The debug interface on Janitza UMG 508, 509, 511, 604, and 605 devices does not require authentication, which allows remote attackers to read or write to files, or execute arbitrary JASIC code, via a session on TCP port 1239.
[ "cpe:2.3:h:janitza:umg_508:-:*:*:*:*:*:*:*", "cpe:2.3:h:janitza:umg_509:-:*:*:*:*:*:*:*", "cpe:2.3:h:janitza:umg_511:-:*:*:*:*:*:*:*", "cpe:2.3:h:janitza:umg_604:-:*:*:*:*:*:*:*", "cpe:2.3:h:janitza:umg_605:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-x78p-5xpv-xmq2
Sensitive information disclosure vulnerability in Micro Focus Self Service Password Reset (SSPR) product. The vulnerability affects versions 4.4.0.0 to 4.4.0.6 and 4.5.0.1 and 4.5.0.2. In certain configurations the vulnerability could disclose sensitive information.
[]
null
null
null
null
null
CVE-2014-1816
Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."
[ "cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-7h6j-2268-fhcm
Improper Certificate Handling
configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging.
[]
null
5.3
null
null
null
CVE-2021-34898
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14865.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-h98w-h4hp-r85v
Improper initialization in some Intel(R) Graphics Driver before version 27.20.100.9030 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
null
CVE-2021-47120
HID: magicmouse: fix NULL-deref on disconnect
In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: fix NULL-deref on disconnect Commit 9d7b18668956 ("HID: magicmouse: add support for Apple Magic Trackpad 2") added a sanity check for an Apple trackpad but returned success instead of -ENODEV when the check failed. This means that the remove callback will dereference the never-initialised driver data pointer when the driver is later unbound (e.g. on USB disconnect).
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2022-0016
GlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms.
[ "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
GHSA-3vh6-pp7q-5xhf
A cross-site scripting (XSS) vulnerability in the Admin Login page of Allworx System Software v9.1.9.12 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SessionID parameter at query.asp.
[]
null
6.1
null
null
null
CVE-2022-38208
Unvalidated redirect in Portal for ArcGIS
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
[ "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-p34r-945f-4cg9
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1190, CVE-2020-1191.
[]
null
null
null
null
null
CVE-2020-2189
Jenkins SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
[ "cpe:2.3:a:jenkins:source_code_management_filter_jervis:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
6.5
null
CVE-2015-6395
Cisco Prime Service Catalog 10.0, 10.0(R2), 10.1, and 11.0 does not properly restrict access to web pages, which allows remote attackers to modify the configuration via a direct request, aka Bug ID CSCuw48188.
[ "cpe:2.3:a:cisco:prime_service_catalog:10.0\\(r2\\)_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_service_catalog:10.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_service_catalog:10.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_service_catalog:11.0_base:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2021-44158
ASUS RT-AX56U Router - Stack-based buffer overflow
ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
[ "cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.44266:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2005-4761
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used.
[ "cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp7:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*" ]
null
null
null
1.2
null
CVE-2005-3589
Buffer overflow in FileZilla Server Terminal 0.9.4d may allow remote attackers to cause a denial of service (terminal crash) via a long USER ftp command.
[ "cpe:2.3:a:filezilla:filezilla_server_terminal:0.9.4d:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-prjm-2fj2-787f
Moodle may allow teachers to access the names of users they could not otherwise access
Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
[]
null
4.3
null
null
null
CVE-2016-7448
The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.
[ "cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2021-38663
Windows exFAT File System Information Disclosure Vulnerability
Windows exFAT File System Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20144:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25740:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20144:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2019-1745
Cisco IOS XE Software Command Injection Vulnerability
A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with elevated privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected commands. An exploit could allow the attacker to gain root privileges on the affected device.
[ "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-82h5-4q54-hmm8
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /boafrm/fromStaticDHCP of the component LAN Settings Page. The manipulation of the argument Hostname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
null
null
null
CVE-2024-32445
WordPress WebinarIgnition plugin <= 3.05.8 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Saleswonder Team WebinarIgnition.This issue affects WebinarIgnition: from n/a through 3.05.8.
[]
null
5.4
null
null
null
RHSA-2024:0293
Red Hat Security Advisory: OpenShift Container Platform 4.14.10 packages and security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.3
null
null
null
GHSA-2ggp-cmvm-f62f
ScanCode.io command injection in docker image fetch process
Command Injection in docker fetch processSummaryA possible command injection in the docker fetch process as it allows to append malicious commands in the docker_reference parameter.DetailsIn the function `scanpipe/pipes/fetch.py:fetch_docker_image`[1] the parameter `docker_reference` is user controllable. The `docker_reference` variable is then passed to the vulnerable function `get_docker_image_platform`.However, the `get_docker_image_plaform` function constructs a shell command with the passed `docker_reference`. The `pipes.run_command` then executes the shell command without any prior sanitization, making the function vulnerable to command injections.A malicious user who is able to create or add inputs to a project can inject commands. Although the command injections are blind and the user will not receive direct feedback without logs, it is still possible to cause damage to the server/container. The vulnerability appears for example if a malicious user adds a semicolon after the input of `docker://;`, it would allow appending malicious commands.PoCCreate a new project with following input `docker://;echo${IFS}"PoC"${IFS}&&cat${IFS}/etc/passwd` in the filed Download URLs ![image](https://user-images.githubusercontent.com/122313513/258454691-7cabe100-f82d-44b9-99f2-5d6a0949e6c4.png)Check docker logs to see the command execution ![image](https://user-images.githubusercontent.com/122313513/258455082-d7590b16-6fcb-4041-949f-2e20959db713.png)**Mitigations** The `docker_reference` input should be sanitized to avoid command injections and it is not recommend to create commands with user controlled input directly.**Tested on:**Commit: Latest commit [bda3a70e0b8cd95433928db1fd4b23051bc7b7eb]OS: Ubuntu Linux Kernel 5.19.0**References** [1] https://github.com/nexB/scancode.io/blob/main/scanpipe/pipes/fetch.py#L185
[]
null
6.8
null
null
null
CVE-2010-0610
Multiple SQL injection vulnerabilities in the Photoblog (com_photoblog) component for Joomla! allow remote attackers to execute arbitrary SQL commands via the blog parameter in an images action to index.php. NOTE: a separate vector for the id parameter to detail.php may also exist.
[ "cpe:2.3:a:webguerilla:com_photoblog:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-10792
There is a NULL Pointer Dereference in the function ll_insert() of the libpspp library in GNU PSPP before 0.11.0. For example, a crash was observed within the library code when attempting to convert invalid SPSS data into CSV format. A crafted input will lead to a remote denial of service attack.
[ "cpe:2.3:a:gnu:pspp:0.10.5-pre2:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2020-14762
Vulnerability in the Oracle Application Express component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2024-31994
Mealie vulnerable to a DoS in recipe image importer (GHSL-2023-228)
Mealie is a self hosted recipe manager and meal planner. Prior to 1.4.0, an attacker can point the image request to an arbitrarily large file. Mealie will attempt to retrieve this file in whole. If it can be retrieved, it may be stored on the file system in whole (leading to possible disk consumption), however the more likely scenario given resource limitations is that the container will OOM during file retrieval if the target file size is greater than the allocated memory of the container. At best this can be used to force the container to infinitely restart due to OOM (if so configured in `docker-compose.yml), or at worst this can be used to force the Mealie container to crash and remain offline. In the event that the file can be retrieved, the lack of rate limiting on this endpoint also permits an attacker to generate ongoing requests to any target of their choice, potentially contributing to an external-facing DoS attack. This vulnerability is fixed in 1.4.0.
[ "cpe:2.3:a:mealie:mealie:1.0.0:beta4:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2023-35670
In computeValuesFromData of FileUtils.java, there is a possible way to insert files to other apps' external private directories due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-x7vj-6hfr-gqfh
Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 7.0.6 and 8.1.5 allows remote attackers to affect integrity, related to WLS Console.
[]
null
null
null
null
null
CVE-2024-8531
CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could compromise the Data Center Expert software when an upgrade bundle is manipulated to include arbitrary bash scripts that are executed as root.
[ "cpe:2.3:a:schneider-electric:data_center_expert:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2018-10586
NetGain Enterprise Manager (EM) is affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities in versions before 10.1.12.
[ "cpe:2.3:a:netgain-systems:enterprise_manager:*:*:*:*:free:*:*:*" ]
null
null
4.8
3.5
null
CVE-2022-24115
Local privilege escalation due to unrestricted loading of unsigned libraries
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
[ "cpe:2.3:a:acronis:true_image:2021:-:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:macos:*:*", "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-wjmq-c2cf-86mr
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.
[]
null
7.1
null
null
null
CVE-2024-49975
uprobes: fix kernel info leak via "[uprobes]" vma
In the Linux kernel, the following vulnerability has been resolved: uprobes: fix kernel info leak via "[uprobes]" vma xol_add_vma() maps the uninitialized page allocated by __create_xol_area() into userspace. On some architectures (x86) this memory is readable even without VM_READ, VM_EXEC results in the same pgprot_t as VM_EXEC|VM_READ, although this doesn't really matter, debugger can read this memory anyway.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2025-21705
mptcp: handle fastopen disconnect correctly
In the Linux kernel, the following vulnerability has been resolved: mptcp: handle fastopen disconnect correctly Syzbot was able to trigger a data stream corruption: WARNING: CPU: 0 PID: 9846 at net/mptcp/protocol.c:1024 __mptcp_clean_una+0xddb/0xff0 net/mptcp/protocol.c:1024 Modules linked in: CPU: 0 UID: 0 PID: 9846 Comm: syz-executor351 Not tainted 6.13.0-rc2-syzkaller-00059-g00a5acdbf398 #0 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 RIP: 0010:__mptcp_clean_una+0xddb/0xff0 net/mptcp/protocol.c:1024 Code: fa ff ff 48 8b 4c 24 18 80 e1 07 fe c1 38 c1 0f 8c 8e fa ff ff 48 8b 7c 24 18 e8 e0 db 54 f6 e9 7f fa ff ff e8 e6 80 ee f5 90 <0f> 0b 90 4c 8b 6c 24 40 4d 89 f4 e9 04 f5 ff ff 44 89 f1 80 e1 07 RSP: 0018:ffffc9000c0cf400 EFLAGS: 00010293 RAX: ffffffff8bb0dd5a RBX: ffff888033f5d230 RCX: ffff888059ce8000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000c0cf518 R08: ffffffff8bb0d1dd R09: 1ffff110170c8928 R10: dffffc0000000000 R11: ffffed10170c8929 R12: 0000000000000000 R13: ffff888033f5d220 R14: dffffc0000000000 R15: ffff8880592b8000 FS: 00007f6e866496c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6e86f491a0 CR3: 00000000310e6000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> __mptcp_clean_una_wakeup+0x7f/0x2d0 net/mptcp/protocol.c:1074 mptcp_release_cb+0x7cb/0xb30 net/mptcp/protocol.c:3493 release_sock+0x1aa/0x1f0 net/core/sock.c:3640 inet_wait_for_connect net/ipv4/af_inet.c:609 [inline] __inet_stream_connect+0x8bd/0xf30 net/ipv4/af_inet.c:703 mptcp_sendmsg_fastopen+0x2a2/0x530 net/mptcp/protocol.c:1755 mptcp_sendmsg+0x1884/0x1b10 net/mptcp/protocol.c:1830 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x1a6/0x270 net/socket.c:726 ____sys_sendmsg+0x52a/0x7e0 net/socket.c:2583 ___sys_sendmsg net/socket.c:2637 [inline] __sys_sendmsg+0x269/0x350 net/socket.c:2669 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6e86ebfe69 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 1f 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f6e86649168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f6e86f491b8 RCX: 00007f6e86ebfe69 RDX: 0000000030004001 RSI: 0000000020000080 RDI: 0000000000000003 RBP: 00007f6e86f491b0 R08: 00007f6e866496c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6e86f491bc R13: 000000000000006e R14: 00007ffe445d9420 R15: 00007ffe445d9508 </TASK> The root cause is the bad handling of disconnect() generated internally by the MPTCP protocol in case of connect FASTOPEN errors. Address the issue increasing the socket disconnect counter even on such a case, to allow other threads waiting on the same socket lock to properly error out.
[]
null
null
null
null
null
CVE-2023-48318
WordPress Contact Form Email plugin <= 1.3.41 - Captcha Bypass vulnerability
Improper Restriction of Excessive Authentication Attempts vulnerability in CodePeople Contact Form Email allows Functionality Bypass.This issue affects Contact Form Email: from n/a through 1.3.41.
[]
null
5.3
null
null
null
CVE-2022-37255
TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
[ "cpe:2.3:o:tp-link:tapo_c310_firmware:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tapo_c310:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2017-16307
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_exw, at 0x9d01b310, the value for the `cmd1` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow.
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*" ]
null
null
8.5
null
null
GHSA-x7g5-wpm2-r3jm
Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network.
[]
null
6.5
null
null
null
CVE-2024-50636
PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.
[ "cpe:2.3:a:schrodinger:pymol:2.5.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-j475-m78p-24gm
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemePrix Fancy Elementor Flipbox fancy-elementor-flipbox allows Stored XSS.This issue affects Fancy Elementor Flipbox: from n/a through 2.4.2.
[]
null
6.5
null
null
null
GHSA-232w-p9jf-7fx8
SQL injection vulnerability in the Shape5 Bridge of Hope template for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an article action to index.php.
[]
null
null
null
null
null
GHSA-7mph-v368-wmv3
Insufficiently protected credentials in the Intel(R) ON Event Series Android application before version 2.0 may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
5.5
null
null
null