id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-85hm-w37j-fg2m
MetInfo 6.1.3 has XSS via the admin/index.php?a=dogetpassword langset parameter.
[]
null
null
6.1
null
GHSA-g7fv-ffv7-x9gv
Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow remote attackers to read content from a different domain via a crafted web site.
[]
null
null
null
null
CVE-2022-48458
In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2019:0469
Red Hat Security Advisory: java-1.8.0-ibm security update
libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() JDK: missing null check when accelerating Unsafe calls OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) JDK: unspecified vulnerability fixed in 8u201 (Deployment)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
3.1
null
CVE-2006-4058
Cross-site scripting (XSS) vulnerability in archive.php in Simplog 0.9.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the keyw parameter when performing a search. NOTE: some details are obtained from third party information.
[ "cpe:2.3:a:simplog:simplog:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2023-45883
A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM.
[ "cpe:2.3:a:qumu:mulitcast_extension:*:*:*:*:*:*:*:*", "cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2006-2790
A package component in Sun Storage Automated Diagnostic Environment (StorADE) 2.4 uses world-writable permissions for certain critical files and directories, which allows local users to gain privileges.
[ "cpe:2.3:a:sun:storage_automated_diagnostic_environment:2.4:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-jr85-6g96-46pc
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
[]
null
4.4
null
null
GHSA-mgpr-w9rj-jmr9
idreamsoft iCMS 7.0.15 allows remote attackers to cause a denial of service (resource consumption) via a query for many comments, as demonstrated by the admincp.php?app=comment&perpage= substring followed by a large positive integer.
[]
null
null
null
null
GHSA-j3vp-x446-7989
There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user.
[]
null
null
null
null
GHSA-32r3-qw98-mc7h
Multiple cross-site request forgery (CSRF) vulnerabilities in includes/campaignmonitor_lists.admin.inc in the Campaign Monitor module 7.x-1.0 for Drupal allow remote attackers to hijack the authentication of users for requests that (1) enable list subscriptions via a request to admin/config/services/campaignmonitor/lists/%/enable or (2) disable list subscriptions via a request to admin/config/services/campaignmonitor/lists/%/disable. NOTE: this refers to an issue in an independently developed Drupal module, and NOT an issue in the Campaign Monitor software itself (described on the campaignmonitor.com web site).
[]
null
null
null
null
GHSA-mx32-h9pq-4mhr
An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0740, CVE-2020-0741, CVE-2020-0743, CVE-2020-0749, CVE-2020-0750.
[]
null
null
null
null
GHSA-fvq8-m245-r4cr
The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server.
[]
null
null
null
null
GHSA-3w87-fgr4-8m86
Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c.
[]
null
null
null
null
CVE-2004-1172
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
[ "cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-gqf2-cp56-f2m4
Huawei smartphones with software of MHA-AL00AC00B125 have an improper resource management vulnerability. The software does not properly manage the resource when do device register operation. An attacker tricks the user who has root privilege to install a crafted application, successful exploit could cause certain service unavailable.
[]
null
null
5.5
null
GHSA-vhpq-rmjq-cgrp
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability.
[]
null
5.5
null
null
RHSA-2024:9089
Red Hat Security Advisory: containernetworking-plugins security update
golang: net: malformed DNS message can cause infinite loop net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
CVE-2009-0552
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 on Windows XP SP2 and SP3, and 6 on Windows Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2007-0930
Variable extract vulnerability in Apache Stats before 0.0.3beta allows attackers to modify arbitrary variables and conduct attacks via unknown vectors involving the use of PHP's extract function.
[ "cpe:2.3:a:apache_stats:apache_stats:0.0.1_beta:*:*:*:*:*:*:*", "cpe:2.3:a:apache_stats:apache_stats:0.0.2_beta:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-jvh9-75qc-f99j
An issue was discovered in certain Apple products. macOS before 10.13.3 is affected. The issue involves the "IOHIDFamily" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
GHSA-xwx2-w5q7-pgf8
A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a threat actor read beyond the intended memory boundaries. This could reveal sensitive information and even cause the application to crash, resulting in a denial-of-service condition. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
[]
null
4.4
null
null
CVE-2007-0838
FreeProxy before 3.92 Build 1626 allows malicious users to cause a denial of service (infinite loop) via a HOST: header with a hostname and port number that refers to the server itself.
[ "cpe:2.3:a:freeproxy:freeproxy:3.92:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-h75j-v2w7-p365
A reflected Cross Site Scripting (XSS) in wuzhicms v4.1.0 allows remote attackers to execute arbitrary web script or HTML via the imgurl parameter.
[]
null
6.1
null
null
CVE-2015-6468
Cross-site request forgery (CSRF) vulnerability in Resource Data Management Data Manager before 2.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[ "cpe:2.3:a:resource_data_management_data_manager:data_manager:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-9mr6-qr78-8xhw
Ben Spink CrushFTP FTP Server 2.1.6 and earlier allows a local attacker to access arbitrary files via a '..' (dot dot) attack, or variations, in (1) GET, (2) CD, (3) NLST, (4) SIZE, (5) RETR.
[]
null
null
null
null
GHSA-x2v6-hm65-m6vw
A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an remote attacker to persist a session after a password reset or similar session clearing event. Successful exploitation of this vulnerability could allow an authenticated attacker to remain on the system with the permissions of their current session after the session should be invalidated in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.
[]
null
5.4
null
null
GHSA-wvh3-h46p-gp3p
Dentsply Sirona (formerly Schick) CDR Dicom 5 and earlier has default passwords for the sa and cdr accounts, which allows remote attackers to obtain administrative access by leveraging knowledge of these passwords.
[]
null
null
9.8
null
CVE-2024-39807
Channel IDs of archived/restored channels leaked via webhook events
Mattermost versions 9.5.x <= 9.5.5 and 9.8.0 fail to properly sanitize the recipients of a webhook event which allows an attacker monitoring webhook events to retrieve the channel IDs of archived or restored channels.
[ "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
GHSA-8xm7-h5wr-j4f5
The installer in Yahoo! Messenger 4.0, 5.0 and 5.5 does not verify package signatures which could allow remote attackers to install trojan programs via DNS spoofing.
[]
null
null
null
null
CVE-2006-0856
SQL injection vulnerability in login.php in Scriptme SmE GB Host 1.21 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the Username parameter.
[ "cpe:2.3:a:scriptme:sme_gb_host:1.21:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2rmp-fw5r-j5qv
Improper Authentication in InfluxDB
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in `services/httpd/handler.go` because a JWT token may have an empty SharedSecret (aka shared secret).
[]
null
9.8
null
null
RHSA-2007:0358
Red Hat Security Advisory: squirrelmail security update
XSS through HTML message in squirrelmail CSRF through HTML message in squirrelmail
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-v2x6-vx52-hr7m
Potential buffer overflow vulnerability in mm_LteInterRatManagement.c in Shannon baseband prior to SMR May-2023 Release 1 allows remote attackers to cause invalid memory access.
[]
null
5.6
null
null
CVE-2011-2645
Unspecified vulnerability in Kiwi before 3.74.2, as used in SUSE Studio 1.1 before 1.1.4, allows remote attackers to execute arbitrary code via a crafted filename for a custom RPM.
[ "cpe:2.3:a:marcus_schafer:kiwi:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_studio_onsite:1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
ICSA-21-245-01
Johnson Controls Sensormatic Electronics Illustra
Under specific circumstances, a local attacker could exploit this vulnerability to obtain super user access to the underlying Linux operating system.CVE-2021-3156 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
CVE-2017-17484
The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.
[ "cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*" ]
null
null
9.8
7.5
CVE-2006-2315
PHP remote file inclusion vulnerability in session.inc.php in ISPConfig 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the go_info[server][classes_root] parameter. NOTE: the vendor has disputed this vulnerability, saying that session.inc.php is not under the web root in version 2.2, and register_globals is not enabled
[ "cpe:2.3:a:ispconfig:ispconfig:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6pxp-rm7g-gpvq
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process.
[]
null
null
8.8
null
GHSA-r36f-f47x-637q
wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:--enable-all CFLAGS="-DWOLFSSL_STATIC_RSA"The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6.  Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.
[]
null
5.9
null
null
CVE-2021-3682
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:6.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.5
null
6
GHSA-5v4x-p332-82v3
Cross-Site Scripting (XSS) vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'start' parameter in '/admin/mod_reports/index.php'.
[]
null
7.1
null
null
CVE-2024-34398
An issue was discovered in BMC Remedy Mid Tier 7.6.04. The web application allows stored HTML Injection by authenticated remote attackers.
[]
null
4.2
null
null
CVE-2023-32460
Dell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.
[ "cpe:2.3:o:dell:poweredge_r660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_mx760c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_mx760c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r860:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r960_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r960:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_hs5610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_hs5610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_hs5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_hs5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r660xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r660xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760xd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760xd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr5610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr5610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr8610t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr8610t:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr8620t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr8620t:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe8640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe8640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe9640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe9680_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe9680:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6615:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r650:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r750xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r750xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_mx750c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_mx750c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r650xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r650xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r750xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r750xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t150:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr4510c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr4510c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr4520c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr4520c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe8545_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe8545:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r840_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r840:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_fc640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_fc640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_m640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_m640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c4140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c4140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_mx740c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_mx740c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_mx840c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_mx840c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r740xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r740xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r740xd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r740xd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r940xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r940xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe2420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe2420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe7440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe7440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6415:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7415:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7425_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7425:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r730xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r730xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c4130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c4130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_m630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_m630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_fc630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_fc630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_fc430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_fc430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_m830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_m830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_fc830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_fc830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_m640_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_m640_\\(pe_vrtx\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_m630_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_m630_\\(pe_vrtx\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_m830_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_m830_\\(pe_vrtx\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:dss_8440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:dss_8440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_storage_nx3240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_storage_nx3240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_storage_nx3340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_storage_nx3340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_nx440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc650:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc750xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc750xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc6520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc6520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xcxr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xcxr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc740xd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc740xd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc7525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc7525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_6420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc740xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc740xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc_core_xc660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc_core_xc660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc_core_xc760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc_core_xc760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc6320_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc6320_hyperconverged_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc430_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc430_hyperconverged_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc630_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc630_hyperconverged_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc730_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc730_hyperconverged_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xc730xd_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xc730xd_hyperconverged_appliance:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-599v-cg8r-98qv
The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
[]
null
null
null
null
RHSA-2017:0881
Red Hat Security Advisory: v8 security update
V8: integer overflow leading to buffer overflow in Zone::New
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
5.6
null
CVE-2017-13198
A vulnerability in the Android media framework (ex) related to composition of frames lacking a color map. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68399117.
[ "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
CVE-2013-6026
The web interface on D-Link DIR-100, DIR-120, DI-624S, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 routers; Planex BRL-04R, BRL-04UR, and BRL-04CW routers; and Alpha Networks routers allows remote attackers to bypass authentication and modify settings via an xmlset_roodkcableoj28840ybtide User-Agent HTTP header, as exploited in the wild in October 2013.
[ "cpe:2.3:h:dlink:di-524up:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-604\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-604s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-604up:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-624s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-100:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-120:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:tm-g5240:-:*:*:*:*:*:*:*", "cpe:2.3:h:alphanetworks:vdsl_asl-55052:-:*:*:*:*:*:*:*", "cpe:2.3:h:alphanetworks:vdsl_asl-56552:-:*:*:*:*:*:*:*", "cpe:2.3:h:planex:brl-04cw:-:*:*:*:*:*:*:*", "cpe:2.3:h:planex:brl-04r:-:*:*:*:*:*:*:*", "cpe:2.3:h:planex:brl-04ur:-:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2008-0116
Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, Compatibility Pack, and Office 2004 and 2008 for Mac allows user-assisted remote attackers to execute arbitrary code via malformed tags in rich text, aka "Excel Rich Text Validation Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2021-47178
scsi: target: core: Avoid smp_processor_id() in preemptible code
In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Avoid smp_processor_id() in preemptible code The BUG message "BUG: using smp_processor_id() in preemptible [00000000] code" was observed for TCMU devices with kernel config DEBUG_PREEMPT. The message was observed when blktests block/005 was run on TCMU devices with fileio backend or user:zbc backend [1]. The commit 1130b499b4a7 ("scsi: target: tcm_loop: Use LIO wq cmd submission helper") triggered the symptom. The commit modified work queue to handle commands and changed 'current->nr_cpu_allowed' at smp_processor_id() call. The message was also observed at system shutdown when TCMU devices were not cleaned up [2]. The function smp_processor_id() was called in SCSI host work queue for abort handling, and triggered the BUG message. This symptom was observed regardless of the commit 1130b499b4a7 ("scsi: target: tcm_loop: Use LIO wq cmd submission helper"). To avoid the preemptible code check at smp_processor_id(), get CPU ID with raw_smp_processor_id() instead. The CPU ID is used for performance improvement then thread move to other CPU will not affect the code. [1] [ 56.468103] run blktests block/005 at 2021-05-12 14:16:38 [ 57.369473] check_preemption_disabled: 85 callbacks suppressed [ 57.369480] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1511 [ 57.369506] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1510 [ 57.369512] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1506 [ 57.369552] caller is __target_init_cmd+0x157/0x170 [target_core_mod] [ 57.369606] CPU: 4 PID: 1506 Comm: fio Not tainted 5.13.0-rc1+ #34 [ 57.369613] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018 [ 57.369617] Call Trace: [ 57.369621] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1507 [ 57.369628] dump_stack+0x6d/0x89 [ 57.369642] check_preemption_disabled+0xc8/0xd0 [ 57.369628] caller is __target_init_cmd+0x157/0x170 [target_core_mod] [ 57.369655] __target_init_cmd+0x157/0x170 [target_core_mod] [ 57.369695] target_init_cmd+0x76/0x90 [target_core_mod] [ 57.369732] tcm_loop_queuecommand+0x109/0x210 [tcm_loop] [ 57.369744] scsi_queue_rq+0x38e/0xc40 [ 57.369761] __blk_mq_try_issue_directly+0x109/0x1c0 [ 57.369779] blk_mq_try_issue_directly+0x43/0x90 [ 57.369790] blk_mq_submit_bio+0x4e5/0x5d0 [ 57.369812] submit_bio_noacct+0x46e/0x4e0 [ 57.369830] __blkdev_direct_IO_simple+0x1a3/0x2d0 [ 57.369859] ? set_init_blocksize.isra.0+0x60/0x60 [ 57.369880] generic_file_read_iter+0x89/0x160 [ 57.369898] blkdev_read_iter+0x44/0x60 [ 57.369906] new_sync_read+0x102/0x170 [ 57.369929] vfs_read+0xd4/0x160 [ 57.369941] __x64_sys_pread64+0x6e/0xa0 [ 57.369946] ? lockdep_hardirqs_on+0x79/0x100 [ 57.369958] do_syscall_64+0x3a/0x70 [ 57.369965] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.369973] RIP: 0033:0x7f7ed4c1399f [ 57.369979] Code: 08 89 3c 24 48 89 4c 24 18 e8 7d f3 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 11 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 cd f3 ff ff 48 8b [ 57.369983] RSP: 002b:00007ffd7918c580 EFLAGS: 00000293 ORIG_RAX: 0000000000000011 [ 57.369990] RAX: ffffffffffffffda RBX: 00000000015b4540 RCX: 00007f7ed4c1399f [ 57.369993] RDX: 0000000000001000 RSI: 00000000015de000 RDI: 0000000000000009 [ 57.369996] RBP: 00000000015b4540 R08: 0000000000000000 R09: 0000000000000001 [ 57.369999] R10: 0000000000e5c000 R11: 0000000000000293 R12: 00007f7eb5269a70 [ 57.370002] R13: 0000000000000000 R14: 0000000000001000 R15: 00000000015b4568 [ 57.370031] CPU: 7 PID: 1507 Comm: fio Not tainted 5.13.0-rc1+ #34 [ 57.370036] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018 [ 57.370039] Call Trace: [ 57.370045] dump_stack+0x6d/0x89 [ 57.370056] ch ---truncated---
[]
null
5.5
null
null
RHSA-2013:1140
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.8) (MFSA 2013-63) Mozilla: Document URI misrepresentation and masquerading (MFSA 2013-68) Mozilla: CRMF requests allow for code execution and XSS attacks (MFSA 2013-69) Mozilla: Wrong principal used for validating URI for some Javascript components (MFSA 2013-72) Mozilla: Same-origin bypass with web workers and XMLHttpRequest (MFSA 2013-73) Mozilla: Local Java applets may read contents of local file system (MFSA 2013-75)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-97cj-7h5h-q2gx
The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
GHSA-9qwq-rm73-j3gr
The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to sensitive information disclosure in versions up to, and including, 1.4.0 due to a lack of proper capability checking on the backup_guard_get_manual_modal function called via an AJAX action. This makes it possible for subscriber-level attackers, and above, to invoke the function and obtain database table information.
[]
null
4.3
null
null
GHSA-jrmg-2w74-rwc9
Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header. This vulnerability affects Thunderbird < 78 and Firefox < 78.0.2.
[]
null
null
null
null
CVE-2022-34153
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:battery_life_diagnostic_tool:2.2.0:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-mfmc-fxm6-3cgf
Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a spreadsheet with a crafted formula embedded in a cell, aka "Excel Formula Parsing Memory Corruption Vulnerability."
[]
null
null
null
null
CVE-2016-6146
The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226.
[ "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*" ]
null
null
5.3
5
CVE-2025-25650
An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication.
[]
null
9.1
null
null
GHSA-h9gv-h378-6468
Public Knowledge Project pkp-lib 3.4.0-7 and earlier is vulnerable to Open redirect due to a lack of input sanitization in the logout function.
[]
null
6.1
null
null
GHSA-3pcq-2643-8rg5
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
[]
null
7.5
null
null
CVE-2020-7632
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
[ "cpe:2.3:a:node-mpv_project:node-mpv:*:*:*:*:*:node.js:*:*" ]
null
9.8
null
7.5
GHSA-29mf-g5hc-vfvc
This issue was addressed through improved state management. This issue is fixed in visionOS 1.3, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. A file received from AirDrop may not have the quarantine flag applied.
[]
null
6.5
null
null
GHSA-rg43-4x9m-w9jh
A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions.
[]
null
null
null
null
CVE-2024-7292
Account Controller allows high count of login attempts
In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts.
[ "cpe:2.3:a:progress_software:telerik_report_server:1.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-98mf-83qw-2xg8
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
[]
null
6.5
null
null
CVE-2020-12895
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
[ "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-5825-j5ch-93j4
NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC , where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution.
[]
null
7.8
null
null
GHSA-w77p-v2rp-vmv8
In the Linux kernel, the following vulnerability has been resolved:arm64: entry: avoid kprobe recursionThe cortex_a76_erratum_1463225_debug_handler() function is called when handling debug exceptions (and synchronous exceptions from BRK instructions), and so is called when a probed function executes. If the compiler does not inline cortex_a76_erratum_1463225_debug_handler(), it can be probed.If cortex_a76_erratum_1463225_debug_handler() is probed, any debug exception or software breakpoint exception will result in recursive exceptions leading to a stack overflow. This can be triggered with the ftrace multiple_probes selftest, and as per the example splat below.This is a regression caused by commit:6459b8469753e9fe ("arm64: entry: consolidate Cortex-A76 erratum 1463225 workaround")... which removed the NOKPROBE_SYMBOL() annotation associated with the function.My intent was that cortex_a76_erratum_1463225_debug_handler() would be inlined into its caller, el1_dbg(), which is marked noinstr and cannot be probed. Mark cortex_a76_erratum_1463225_debug_handler() as __always_inline to ensure this.Example splat prior to this patch (with recursive entries elided):| # echo p cortex_a76_erratum_1463225_debug_handler > /sys/kernel/debug/tracing/kprobe_events | # echo p do_el0_svc >> /sys/kernel/debug/tracing/kprobe_events | # echo 1 > /sys/kernel/debug/tracing/events/kprobes/enable | Insufficient stack space to handle exception! | ESR: 0x0000000096000047 -- DABT (current EL) | FAR: 0xffff800009cefff0 | Task stack: [0xffff800009cf0000..0xffff800009cf4000] | IRQ stack: [0xffff800008000000..0xffff800008004000] | Overflow stack: [0xffff00007fbc00f0..0xffff00007fbc10f0] | CPU: 0 PID: 145 Comm: sh Not tainted 6.0.0 #2 | Hardware name: linux,dummy-virt (DT) | pstate: 604003c5 (nZCv DAIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) | pc : arm64_enter_el1_dbg+0x4/0x20 | lr : el1_dbg+0x24/0x5c | sp : ffff800009cf0000 | x29: ffff800009cf0000 x28: ffff000002c74740 x27: 0000000000000000 | x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 | x23: 00000000604003c5 x22: ffff80000801745c x21: 0000aaaac95ac068 | x20: 00000000f2000004 x19: ffff800009cf0040 x18: 0000000000000000 | x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 | x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 | x11: 0000000000000010 x10: ffff800008c87190 x9 : ffff800008ca00d0 | x8 : 000000000000003c x7 : 0000000000000000 x6 : 0000000000000000 | x5 : 0000000000000000 x4 : 0000000000000000 x3 : 00000000000043a4 | x2 : 00000000f2000004 x1 : 00000000f2000004 x0 : ffff800009cf0040 | Kernel panic - not syncing: kernel stack overflow | CPU: 0 PID: 145 Comm: sh Not tainted 6.0.0 #2 | Hardware name: linux,dummy-virt (DT) | Call trace: | dump_backtrace+0xe4/0x104 | show_stack+0x18/0x4c | dump_stack_lvl+0x64/0x7c | dump_stack+0x18/0x38 | panic+0x14c/0x338 | test_taint+0x0/0x2c | panic_bad_stack+0x104/0x118 | handle_bad_stack+0x34/0x48 | __bad_stack+0x78/0x7c | arm64_enter_el1_dbg+0x4/0x20 | el1h_64_sync_handler+0x40/0x98 | el1h_64_sync+0x64/0x68 | cortex_a76_erratum_1463225_debug_handler+0x0/0x34 ... | el1h_64_sync_handler+0x40/0x98 | el1h_64_sync+0x64/0x68 | cortex_a76_erratum_1463225_debug_handler+0x0/0x34 ... | el1h_64_sync_handler+0x40/0x98 | el1h_64_sync+0x64/0x68 | cortex_a76_erratum_1463225_debug_handler+0x0/0x34 | el1h_64_sync_handler+0x40/0x98 | el1h_64_sync+0x64/0x68 | do_el0_svc+0x0/0x28 | el0t_64_sync_handler+0x84/0xf0 | el0t_64_sync+0x18c/0x190 | Kernel Offset: disabled | CPU features: 0x0080,00005021,19001080 | Memory Limit: none | ---[ end Kernel panic - not syncing: kernel stack overflow ]---With this patch, cortex_a76_erratum_1463225_debug_handler() is inlined into el1_dbg(), and el1_dbg() cannot be probed:| # echo p cortex_a76_erratum_1463225_debug_handler > /sys/kernel/debug/tracing/kprobe_events | sh: write error: No such file or directory | # grep -w cortex_a76_errat ---truncated---
[]
null
7.8
null
null
CVE-2018-13711
The mintToken function of a smart contract implementation for Databits, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:databits_project:databits:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2006-5630
Hosting Controller 6.1 before Hotfix 3.3 allows remote attackers to (1) delete the virtual directory of an arbitrary site via a modified ForumID parameter in a disableforum action in DisableForum.asp and (2) create an arbitrary forum virtual directory via an empty ForumID parameter in an enableforum action in EnableForum.asp.
[ "cpe:2.3:a:hosting_controller:hosting_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.4b:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.4:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.7:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.9:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.0:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.2:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.3:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.4:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:2002:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:2002_rc_1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cghm-v6v8-jp7r
In the Linux kernel, the following vulnerability has been resolved:fsdax: Fix infinite loop in dax_iomap_rw()I got an infinite loop and a WARNING report when executing a tail command in virtiofs.WARNING: CPU: 10 PID: 964 at fs/iomap/iter.c:34 iomap_iter+0x3a2/0x3d0 Modules linked in: CPU: 10 PID: 964 Comm: tail Not tainted 5.19.0-rc7 Call Trace: <TASK> dax_iomap_rw+0xea/0x620 ? __this_cpu_preempt_check+0x13/0x20 fuse_dax_read_iter+0x47/0x80 fuse_file_read_iter+0xae/0xd0 new_sync_read+0xfe/0x180 ? 0xffffffff81000000 vfs_read+0x14d/0x1a0 ksys_read+0x6d/0xf0 __x64_sys_read+0x1a/0x20 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcdThe tail command will call read() with a count of 0. In this case, iomap_iter() will report this WARNING, and always return 1 which casuing the infinite loop in dax_iomap_rw().Fixing by checking count whether is 0 in dax_iomap_rw().
[]
null
6.2
null
null
CVE-2019-15457
The Samsung J6 Android device with a build fingerprint of samsung/j6ltexx/j6lte:8.0.0/R16NW/J600FNXXU3ASC1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[ "cpe:2.3:o:samsung:galaxy_j6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_j6:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
RHSA-2009:1469
Red Hat Security Advisory: kernel security update
kernel: r8169: fix crash when large packets are received kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2023:5001
Red Hat Security Advisory: OpenShift Container Platform 4.11.49 bug fix and security update
exporter-toolkit: authentication bypass via cache poisoning
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
CVE-2012-2577
Multiple cross-site scripting (XSS) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) before 10.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) syslocation, (2) syscontact, or (3) sysName field of an snmpd.conf file.
[ "cpe:2.3:a:solarwinds:orion_network_performance_monitor:*:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:7.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:9.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-qxrm-rjv7-w3rx
A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by this vulnerability is the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
8.8
null
null
GHSA-wcmj-f23c-wrx2
The Paid Memberships Pro WordPress plugin before 2.9.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[]
null
5.4
null
null
CVE-2024-32135
WordPress Disable Comments | WPZest plugin <= 1.51 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPZest Disable Comments | WPZest.This issue affects Disable Comments | WPZest: from n/a through 1.51.
[]
null
7.6
null
null
RHSA-2024:11299
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
CVE-2025-24670
WordPress Term Taxonomy Converter Plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dhanendran Rajagopal Term Taxonomy Converter allows Reflected XSS. This issue affects Term Taxonomy Converter: from n/a through 1.2.
[]
null
7.1
null
null
RHSA-2019:0711
Red Hat Security Advisory: openssh security update
openssh: User enumeration via malformed packets in authentication requests
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
GHSA-m982-h4f8-g4hf
Generation of Error Message Containing Sensitive Information in janeczku/calibre-web
A vulnerability in janeczku/calibre-web allows unauthorized users to view the names of private shelves belonging to other users. This issue occurs in the file shelf.py at line 221, where the name of the shelf is exposed in an error message when a user attempts to remove a book from a shelf they do not own. This vulnerability discloses private information and affects all versions prior to the fix.
[]
null
4.3
null
null
CVE-2006-6414
Multiple SQL injection vulnerabilities in dettaglio.asp in dol storye allow remote attackers to execute arbitrary SQL commands via the (1) id_doc or (2) id_aut parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:dol_storye:dol_storye:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7p85-rcff-vxq4
In CAacDecoder_DecodeFrame of aacdecode.cpp, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution in the media server with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112891564
[]
null
null
8.8
null
CVE-2002-1141
An input validation error in the Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote attackers to cause a denial of service via malformed fragmented RPC client packets, aka "Denial of service by sending an invalid RPC request."
[ "cpe:2.3:a:microsoft:services:3.0:*:unix:*:*:*:*:*" ]
null
null
null
5
CVE-2024-20380
ClamAV HTML Parser Denial of Service Vulnerability
A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software.
[ "cpe:2.3:a:cisco:clam_antivirus:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-w62x-587h-wg93
Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.2 allow remote attackers to cause a denial of service (device reload) via a high rate of crafted packets, aka Bug ID CSCui06507.
[]
null
null
null
null
GHSA-hpwc-68gr-45h5
An XSS issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application doesn't properly check parameters, sent in a /dvcset/sysset/set.cgi POST request via the arg01.Hostname field, before saving them on the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.
[]
null
6.1
null
null
CVE-2021-33894
In Progress MOVEit Transfer before 2019.0.6 (11.0.6), 2019.1.x before 2019.1.5 (11.1.5), 2019.2.x before 2019.2.2 (11.2.2), 2020.x before 2020.0.5 (12.0.5), 2020.1.x before 2020.1.4 (12.1.4), and 2021.x before 2021.0.1 (13.0.1), a SQL injection vulnerability exists in SILUtility.vb in MOVEit.DMZ.WebApp in the MOVEit Transfer web app. This could allow an authenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database and/or execute SQL statements that alter or delete database elements.
[ "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2017-12804
The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.
[ "cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2025-24594
WordPress Linet ERP-Woocommerce Integration plugin <= 3.5.7 - CSRF to Broken Access Control vulnerability
Missing Authorization vulnerability in Speedcomp Linet ERP-Woocommerce Integration allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.7.
[]
null
6.5
null
null
GHSA-3gfm-x3mg-hww2
Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability."
[]
null
null
null
null
GHSA-v263-ghf9-h2rx
libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_strInitUtf8 at string.c.
[]
null
8.8
null
null
CVE-2018-2570
Vulnerability in the Oracle Communications Unified Inventory Management component of Oracle Communications Applications (subcomponent: Portal). Supported versions that are affected are 7.2.4.2.x and 7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Unified Inventory Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Unified Inventory Management accessible data as well as unauthorized read access to a subset of Oracle Communications Unified Inventory Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Unified Inventory Management. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[ "cpe:2.3:a:oracle:communications_unified_inventory_management:7.2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3:*:*:*:*:*:*:*" ]
null
null
6.3
6.5
GHSA-8qx3-cq4j-g455
A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
[]
null
7.8
null
null
GHSA-j6r6-8wjh-8gcw
A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via webmaster-tools.php in the "to_time" parameter.
[]
null
null
null
null
GHSA-vjf4-chxp-cg8g
jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
[]
null
null
null
null
CVE-2018-11538
servlet/UserServlet in SearchBlox 8.6.6 has CSRF via the u_name, u_passwd1, u_passwd2, role, and X-XSRF-TOKEN POST parameters because of CSRF Token Bypass.
[ "cpe:2.3:a:searchblox:searchblox:8.6.6:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2023-48950
An issue in the box_col_len function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
[ "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*" ]
null
7.5
null
null
CVE-2009-1773
activeCollab 2.1 Corporate allows remote attackers to obtain sensitive information via an invalid re_route parameter to the login script, which reveals the installation path in an error message.
[ "cpe:2.3:a:activecollab:activecollab:2.1.0:*:*:*:*:*:*:*" ]
null
null
null
5