id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-85hm-w37j-fg2m | MetInfo 6.1.3 has XSS via the admin/index.php?a=dogetpassword langset parameter. | [] | null | null | 6.1 | null |
|
GHSA-g7fv-ffv7-x9gv | Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow remote attackers to read content from a different domain via a crafted web site. | [] | null | null | null | null |
|
CVE-2022-48458 | In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed | [
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2019:0469 | Red Hat Security Advisory: java-1.8.0-ibm security update | libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() JDK: missing null check when accelerating Unsafe calls OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) JDK: unspecified vulnerability fixed in 8u201 (Deployment) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.1 | null |
CVE-2006-4058 | Cross-site scripting (XSS) vulnerability in archive.php in Simplog 0.9.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the keyw parameter when performing a search. NOTE: some details are obtained from third party information. | [
"cpe:2.3:a:simplog:simplog:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-45883 | A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM. | [
"cpe:2.3:a:qumu:mulitcast_extension:*:*:*:*:*:*:*:*",
"cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2006-2790 | A package component in Sun Storage Automated Diagnostic Environment (StorADE) 2.4 uses world-writable permissions for certain critical files and directories, which allows local users to gain privileges. | [
"cpe:2.3:a:sun:storage_automated_diagnostic_environment:2.4:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-jr85-6g96-46pc | A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. | [] | null | 4.4 | null | null |
|
GHSA-mgpr-w9rj-jmr9 | idreamsoft iCMS 7.0.15 allows remote attackers to cause a denial of service (resource consumption) via a query for many comments, as demonstrated by the admincp.php?app=comment&perpage= substring followed by a large positive integer. | [] | null | null | null | null |
|
GHSA-j3vp-x446-7989 | There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. | [] | null | null | null | null |
|
GHSA-32r3-qw98-mc7h | Multiple cross-site request forgery (CSRF) vulnerabilities in includes/campaignmonitor_lists.admin.inc in the Campaign Monitor module 7.x-1.0 for Drupal allow remote attackers to hijack the authentication of users for requests that (1) enable list subscriptions via a request to admin/config/services/campaignmonitor/lists/%/enable or (2) disable list subscriptions via a request to admin/config/services/campaignmonitor/lists/%/disable. NOTE: this refers to an issue in an independently developed Drupal module, and NOT an issue in the Campaign Monitor software itself (described on the campaignmonitor.com web site). | [] | null | null | null | null |
|
GHSA-mx32-h9pq-4mhr | An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0740, CVE-2020-0741, CVE-2020-0743, CVE-2020-0749, CVE-2020-0750. | [] | null | null | null | null |
|
GHSA-fvq8-m245-r4cr | The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server. | [] | null | null | null | null |
|
GHSA-3w87-fgr4-8m86 | Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c. | [] | null | null | null | null |
|
CVE-2004-1172 | Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname. | [
"cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-gqf2-cp56-f2m4 | Huawei smartphones with software of MHA-AL00AC00B125 have an improper resource management vulnerability. The software does not properly manage the resource when do device register operation. An attacker tricks the user who has root privilege to install a crafted application, successful exploit could cause certain service unavailable. | [] | null | null | 5.5 | null |
|
GHSA-vhpq-rmjq-cgrp | A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability. | [] | null | 5.5 | null | null |
|
RHSA-2024:9089 | Red Hat Security Advisory: containernetworking-plugins security update | golang: net: malformed DNS message can cause infinite loop net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
CVE-2009-0552 | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 on Windows XP SP2 and SP3, and 6 on Windows Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2007-0930 | Variable extract vulnerability in Apache Stats before 0.0.3beta allows attackers to modify arbitrary variables and conduct attacks via unknown vectors involving the use of PHP's extract function. | [
"cpe:2.3:a:apache_stats:apache_stats:0.0.1_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:apache_stats:apache_stats:0.0.2_beta:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-jvh9-75qc-f99j | An issue was discovered in certain Apple products. macOS before 10.13.3 is affected. The issue involves the "IOHIDFamily" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] | null | null | 7.8 | null |
|
GHSA-xwx2-w5q7-pgf8 | A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a threat actor read beyond the intended memory boundaries. This could reveal sensitive information and even cause the application to crash, resulting in a denial-of-service condition. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor. | [] | null | 4.4 | null | null |
|
CVE-2007-0838 | FreeProxy before 3.92 Build 1626 allows malicious users to cause a denial of service (infinite loop) via a HOST: header with a hostname and port number that refers to the server itself. | [
"cpe:2.3:a:freeproxy:freeproxy:3.92:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-h75j-v2w7-p365 | A reflected Cross Site Scripting (XSS) in wuzhicms v4.1.0 allows remote attackers to execute arbitrary web script or HTML via the imgurl parameter. | [] | null | 6.1 | null | null |
|
CVE-2015-6468 | Cross-site request forgery (CSRF) vulnerability in Resource Data Management Data Manager before 2.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:resource_data_management_data_manager:data_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-9mr6-qr78-8xhw | Ben Spink CrushFTP FTP Server 2.1.6 and earlier allows a local attacker to access arbitrary files via a '..' (dot dot) attack, or variations, in (1) GET, (2) CD, (3) NLST, (4) SIZE, (5) RETR. | [] | null | null | null | null |
|
GHSA-x2v6-hm65-m6vw | A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an remote attacker to persist a session after a password reset or similar session clearing event. Successful exploitation of this vulnerability could allow an authenticated attacker to remain on the system with the permissions of their current session after the session should be invalidated in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned. | [] | null | 5.4 | null | null |
|
GHSA-wvh3-h46p-gp3p | Dentsply Sirona (formerly Schick) CDR Dicom 5 and earlier has default passwords for the sa and cdr accounts, which allows remote attackers to obtain administrative access by leveraging knowledge of these passwords. | [] | null | null | 9.8 | null |
|
CVE-2024-39807 | Channel IDs of archived/restored channels leaked via webhook events | Mattermost versions 9.5.x <= 9.5.5 and 9.8.0 fail to properly sanitize the recipients of a webhook event which allows an attacker monitoring webhook events to retrieve the channel IDs of archived or restored channels. | [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null |
GHSA-8xm7-h5wr-j4f5 | The installer in Yahoo! Messenger 4.0, 5.0 and 5.5 does not verify package signatures which could allow remote attackers to install trojan programs via DNS spoofing. | [] | null | null | null | null |
|
CVE-2006-0856 | SQL injection vulnerability in login.php in Scriptme SmE GB Host 1.21 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the Username parameter. | [
"cpe:2.3:a:scriptme:sme_gb_host:1.21:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2rmp-fw5r-j5qv | Improper Authentication in InfluxDB | InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in `services/httpd/handler.go` because a JWT token may have an empty SharedSecret (aka shared secret). | [] | null | 9.8 | null | null |
RHSA-2007:0358 | Red Hat Security Advisory: squirrelmail security update | XSS through HTML message in squirrelmail CSRF through HTML message in squirrelmail | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-v2x6-vx52-hr7m | Potential buffer overflow vulnerability in mm_LteInterRatManagement.c in Shannon baseband prior to SMR May-2023 Release 1 allows remote attackers to cause invalid memory access. | [] | null | 5.6 | null | null |
|
CVE-2011-2645 | Unspecified vulnerability in Kiwi before 3.74.2, as used in SUSE Studio 1.1 before 1.1.4, allows remote attackers to execute arbitrary code via a crafted filename for a custom RPM. | [
"cpe:2.3:a:marcus_schafer:kiwi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_studio_onsite:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
ICSA-21-245-01 | Johnson Controls Sensormatic Electronics Illustra | Under specific circumstances, a local attacker could exploit this vulnerability to obtain super user access to the underlying Linux operating system.CVE-2021-3156 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
CVE-2017-17484 | The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. | [
"cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2006-2315 | PHP remote file inclusion vulnerability in session.inc.php in ISPConfig 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the go_info[server][classes_root] parameter. NOTE: the vendor has disputed this vulnerability, saying that session.inc.php is not under the web root in version 2.2, and register_globals is not enabled | [
"cpe:2.3:a:ispconfig:ispconfig:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-6pxp-rm7g-gpvq | upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. | [] | null | null | 8.8 | null |
|
GHSA-r36f-f47x-637q | wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:--enable-all CFLAGS="-DWOLFSSL_STATIC_RSA"The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6. Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed. | [] | null | 5.9 | null | null |
|
CVE-2021-3682 | A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:6.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.5 | null | 6 |
|
GHSA-5v4x-p332-82v3 | Cross-Site Scripting (XSS) vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'start' parameter in '/admin/mod_reports/index.php'. | [] | null | 7.1 | null | null |
|
CVE-2024-34398 | An issue was discovered in BMC Remedy Mid Tier 7.6.04. The web application allows stored HTML Injection by authenticated remote attackers. | [] | null | 4.2 | null | null |
|
CVE-2023-32460 |
Dell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.
| [
"cpe:2.3:o:dell:poweredge_r660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c6620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_mx760c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_mx760c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r960_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r960:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_hs5610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_hs5610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_hs5620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_hs5620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r660xs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r660xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r760xs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r760xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r760xd2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r760xd2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r760xa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r760xa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr5610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr5610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr8610t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr8610t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr8620t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr8620t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr7620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr7620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe8640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe8640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe9640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe9680_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe9680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c6615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c6615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r750xa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r750xa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c6520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c6520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_mx750c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_mx750c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r650xs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r650xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r750xs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r750xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr4510c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr4510c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr4520c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr4520c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r6515_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r6515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r6525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r6525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r7515_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r7515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r7525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r7525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c6525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c6525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe8545_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe8545:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r740_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r940_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xr2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xr2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r840_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c6420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_fc640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_fc640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_m640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_m640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c4140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c4140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_mx740c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_mx740c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_mx840c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_mx840c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r740xd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r740xd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r740xd2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r740xd2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r940xa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r940xa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe2420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe2420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe7420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe7420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_xe7440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_xe7440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r6415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r6415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r7415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r7415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r7425_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r7425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r730_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r730xd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r730xd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c4130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c4130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_m630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_m630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_fc630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_fc630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_fc430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_fc430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_m830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_m830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_fc830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_fc830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_c6320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_c6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_t330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_t330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_r830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_r830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_m640_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_m640_\\(pe_vrtx\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_m630_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_m630_\\(pe_vrtx\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:poweredge_m830_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:poweredge_m830_\\(pe_vrtx\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dss_8440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:dss_8440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_storage_nx3240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_storage_nx3240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_storage_nx3340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_storage_nx3340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_nx440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc750xa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc750xa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc6520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc6520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xcxr2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xcxr2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc740xd2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc740xd2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc7525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc7525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_6420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc740xd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc740xd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_xc_core_xc940_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_xc_core_xc940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc_core_xc660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc_core_xc660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc_core_xc760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc_core_xc760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc6320_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc6320_hyperconverged_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc430_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc430_hyperconverged_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc630_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc630_hyperconverged_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc730_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc730_hyperconverged_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xc730xd_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xc730xd_hyperconverged_appliance:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-599v-cg8r-98qv | The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read. | [] | null | null | null | null |
|
RHSA-2017:0881 | Red Hat Security Advisory: v8 security update | V8: integer overflow leading to buffer overflow in Zone::New | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.6 | null |
CVE-2017-13198 | A vulnerability in the Android media framework (ex) related to composition of frames lacking a color map. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68399117. | [
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2013-6026 | The web interface on D-Link DIR-100, DIR-120, DI-624S, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 routers; Planex BRL-04R, BRL-04UR, and BRL-04CW routers; and Alpha Networks routers allows remote attackers to bypass authentication and modify settings via an xmlset_roodkcableoj28840ybtide User-Agent HTTP header, as exploited in the wild in October 2013. | [
"cpe:2.3:h:dlink:di-524up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-604\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-604s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-604up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-624s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:tm-g5240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:alphanetworks:vdsl_asl-55052:-:*:*:*:*:*:*:*",
"cpe:2.3:h:alphanetworks:vdsl_asl-56552:-:*:*:*:*:*:*:*",
"cpe:2.3:h:planex:brl-04cw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:planex:brl-04r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:planex:brl-04ur:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2008-0116 | Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, Compatibility Pack, and Office 2004 and 2008 for Mac allows user-assisted remote attackers to execute arbitrary code via malformed tags in rich text, aka "Excel Rich Text Validation Vulnerability." | [
"cpe:2.3:a:microsoft:excel:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2021-47178 | scsi: target: core: Avoid smp_processor_id() in preemptible code | In the Linux kernel, the following vulnerability has been resolved:
scsi: target: core: Avoid smp_processor_id() in preemptible code
The BUG message "BUG: using smp_processor_id() in preemptible [00000000]
code" was observed for TCMU devices with kernel config DEBUG_PREEMPT.
The message was observed when blktests block/005 was run on TCMU devices
with fileio backend or user:zbc backend [1]. The commit 1130b499b4a7
("scsi: target: tcm_loop: Use LIO wq cmd submission helper") triggered the
symptom. The commit modified work queue to handle commands and changed
'current->nr_cpu_allowed' at smp_processor_id() call.
The message was also observed at system shutdown when TCMU devices were not
cleaned up [2]. The function smp_processor_id() was called in SCSI host
work queue for abort handling, and triggered the BUG message. This symptom
was observed regardless of the commit 1130b499b4a7 ("scsi: target:
tcm_loop: Use LIO wq cmd submission helper").
To avoid the preemptible code check at smp_processor_id(), get CPU ID with
raw_smp_processor_id() instead. The CPU ID is used for performance
improvement then thread move to other CPU will not affect the code.
[1]
[ 56.468103] run blktests block/005 at 2021-05-12 14:16:38
[ 57.369473] check_preemption_disabled: 85 callbacks suppressed
[ 57.369480] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1511
[ 57.369506] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1510
[ 57.369512] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1506
[ 57.369552] caller is __target_init_cmd+0x157/0x170 [target_core_mod]
[ 57.369606] CPU: 4 PID: 1506 Comm: fio Not tainted 5.13.0-rc1+ #34
[ 57.369613] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018
[ 57.369617] Call Trace:
[ 57.369621] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1507
[ 57.369628] dump_stack+0x6d/0x89
[ 57.369642] check_preemption_disabled+0xc8/0xd0
[ 57.369628] caller is __target_init_cmd+0x157/0x170 [target_core_mod]
[ 57.369655] __target_init_cmd+0x157/0x170 [target_core_mod]
[ 57.369695] target_init_cmd+0x76/0x90 [target_core_mod]
[ 57.369732] tcm_loop_queuecommand+0x109/0x210 [tcm_loop]
[ 57.369744] scsi_queue_rq+0x38e/0xc40
[ 57.369761] __blk_mq_try_issue_directly+0x109/0x1c0
[ 57.369779] blk_mq_try_issue_directly+0x43/0x90
[ 57.369790] blk_mq_submit_bio+0x4e5/0x5d0
[ 57.369812] submit_bio_noacct+0x46e/0x4e0
[ 57.369830] __blkdev_direct_IO_simple+0x1a3/0x2d0
[ 57.369859] ? set_init_blocksize.isra.0+0x60/0x60
[ 57.369880] generic_file_read_iter+0x89/0x160
[ 57.369898] blkdev_read_iter+0x44/0x60
[ 57.369906] new_sync_read+0x102/0x170
[ 57.369929] vfs_read+0xd4/0x160
[ 57.369941] __x64_sys_pread64+0x6e/0xa0
[ 57.369946] ? lockdep_hardirqs_on+0x79/0x100
[ 57.369958] do_syscall_64+0x3a/0x70
[ 57.369965] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 57.369973] RIP: 0033:0x7f7ed4c1399f
[ 57.369979] Code: 08 89 3c 24 48 89 4c 24 18 e8 7d f3 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 11 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 cd f3 ff ff 48 8b
[ 57.369983] RSP: 002b:00007ffd7918c580 EFLAGS: 00000293 ORIG_RAX: 0000000000000011
[ 57.369990] RAX: ffffffffffffffda RBX: 00000000015b4540 RCX: 00007f7ed4c1399f
[ 57.369993] RDX: 0000000000001000 RSI: 00000000015de000 RDI: 0000000000000009
[ 57.369996] RBP: 00000000015b4540 R08: 0000000000000000 R09: 0000000000000001
[ 57.369999] R10: 0000000000e5c000 R11: 0000000000000293 R12: 00007f7eb5269a70
[ 57.370002] R13: 0000000000000000 R14: 0000000000001000 R15: 00000000015b4568
[ 57.370031] CPU: 7 PID: 1507 Comm: fio Not tainted 5.13.0-rc1+ #34
[ 57.370036] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018
[ 57.370039] Call Trace:
[ 57.370045] dump_stack+0x6d/0x89
[ 57.370056] ch
---truncated--- | [] | null | 5.5 | null | null |
RHSA-2013:1140 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.8) (MFSA 2013-63) Mozilla: Document URI misrepresentation and masquerading (MFSA 2013-68) Mozilla: CRMF requests allow for code execution and XSS attacks (MFSA 2013-69) Mozilla: Wrong principal used for validating URI for some Javascript components (MFSA 2013-72) Mozilla: Same-origin bypass with web workers and XMLHttpRequest (MFSA 2013-73) Mozilla: Local Java applets may read contents of local file system (MFSA 2013-75) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-97cj-7h5h-q2gx | The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
GHSA-9qwq-rm73-j3gr | The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to sensitive information disclosure in versions up to, and including, 1.4.0 due to a lack of proper capability checking on the backup_guard_get_manual_modal function called via an AJAX action. This makes it possible for subscriber-level attackers, and above, to invoke the function and obtain database table information. | [] | null | 4.3 | null | null |
|
GHSA-jrmg-2w74-rwc9 | Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header. This vulnerability affects Thunderbird < 78 and Firefox < 78.0.2. | [] | null | null | null | null |
|
CVE-2022-34153 | Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:battery_life_diagnostic_tool:2.2.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-mfmc-fxm6-3cgf | Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a spreadsheet with a crafted formula embedded in a cell, aka "Excel Formula Parsing Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2016-6146 | The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226. | [
"cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2025-25650 | An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication. | [] | null | 9.1 | null | null |
|
GHSA-h9gv-h378-6468 | Public Knowledge Project pkp-lib 3.4.0-7 and earlier is vulnerable to Open redirect due to a lack of input sanitization in the logout function. | [] | null | 6.1 | null | null |
|
GHSA-3pcq-2643-8rg5 | In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941 | [] | null | 7.5 | null | null |
|
CVE-2020-7632 | node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument. | [
"cpe:2.3:a:node-mpv_project:node-mpv:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-29mf-g5hc-vfvc | This issue was addressed through improved state management. This issue is fixed in visionOS 1.3, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. A file received from AirDrop may not have the quarantine flag applied. | [] | null | 6.5 | null | null |
|
GHSA-rg43-4x9m-w9jh | A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions. | [] | null | null | null | null |
|
CVE-2024-7292 | Account Controller allows high count of login attempts | In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts. | [
"cpe:2.3:a:progress_software:telerik_report_server:1.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-98mf-83qw-2xg8 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | [] | null | 6.5 | null | null |
|
CVE-2020-12895 | Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service. | [
"cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-5825-j5ch-93j4 | NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC , where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution. | [] | null | 7.8 | null | null |
|
GHSA-w77p-v2rp-vmv8 | In the Linux kernel, the following vulnerability has been resolved:arm64: entry: avoid kprobe recursionThe cortex_a76_erratum_1463225_debug_handler() function is called when
handling debug exceptions (and synchronous exceptions from BRK
instructions), and so is called when a probed function executes. If the
compiler does not inline cortex_a76_erratum_1463225_debug_handler(), it
can be probed.If cortex_a76_erratum_1463225_debug_handler() is probed, any debug
exception or software breakpoint exception will result in recursive
exceptions leading to a stack overflow. This can be triggered with the
ftrace multiple_probes selftest, and as per the example splat below.This is a regression caused by commit:6459b8469753e9fe ("arm64: entry: consolidate Cortex-A76 erratum 1463225 workaround")... which removed the NOKPROBE_SYMBOL() annotation associated with the
function.My intent was that cortex_a76_erratum_1463225_debug_handler() would be
inlined into its caller, el1_dbg(), which is marked noinstr and cannot
be probed. Mark cortex_a76_erratum_1463225_debug_handler() as
__always_inline to ensure this.Example splat prior to this patch (with recursive entries elided):| # echo p cortex_a76_erratum_1463225_debug_handler > /sys/kernel/debug/tracing/kprobe_events
| # echo p do_el0_svc >> /sys/kernel/debug/tracing/kprobe_events
| # echo 1 > /sys/kernel/debug/tracing/events/kprobes/enable
| Insufficient stack space to handle exception!
| ESR: 0x0000000096000047 -- DABT (current EL)
| FAR: 0xffff800009cefff0
| Task stack: [0xffff800009cf0000..0xffff800009cf4000]
| IRQ stack: [0xffff800008000000..0xffff800008004000]
| Overflow stack: [0xffff00007fbc00f0..0xffff00007fbc10f0]
| CPU: 0 PID: 145 Comm: sh Not tainted 6.0.0 #2
| Hardware name: linux,dummy-virt (DT)
| pstate: 604003c5 (nZCv DAIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : arm64_enter_el1_dbg+0x4/0x20
| lr : el1_dbg+0x24/0x5c
| sp : ffff800009cf0000
| x29: ffff800009cf0000 x28: ffff000002c74740 x27: 0000000000000000
| x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
| x23: 00000000604003c5 x22: ffff80000801745c x21: 0000aaaac95ac068
| x20: 00000000f2000004 x19: ffff800009cf0040 x18: 0000000000000000
| x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
| x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
| x11: 0000000000000010 x10: ffff800008c87190 x9 : ffff800008ca00d0
| x8 : 000000000000003c x7 : 0000000000000000 x6 : 0000000000000000
| x5 : 0000000000000000 x4 : 0000000000000000 x3 : 00000000000043a4
| x2 : 00000000f2000004 x1 : 00000000f2000004 x0 : ffff800009cf0040
| Kernel panic - not syncing: kernel stack overflow
| CPU: 0 PID: 145 Comm: sh Not tainted 6.0.0 #2
| Hardware name: linux,dummy-virt (DT)
| Call trace:
| dump_backtrace+0xe4/0x104
| show_stack+0x18/0x4c
| dump_stack_lvl+0x64/0x7c
| dump_stack+0x18/0x38
| panic+0x14c/0x338
| test_taint+0x0/0x2c
| panic_bad_stack+0x104/0x118
| handle_bad_stack+0x34/0x48
| __bad_stack+0x78/0x7c
| arm64_enter_el1_dbg+0x4/0x20
| el1h_64_sync_handler+0x40/0x98
| el1h_64_sync+0x64/0x68
| cortex_a76_erratum_1463225_debug_handler+0x0/0x34
...
| el1h_64_sync_handler+0x40/0x98
| el1h_64_sync+0x64/0x68
| cortex_a76_erratum_1463225_debug_handler+0x0/0x34
...
| el1h_64_sync_handler+0x40/0x98
| el1h_64_sync+0x64/0x68
| cortex_a76_erratum_1463225_debug_handler+0x0/0x34
| el1h_64_sync_handler+0x40/0x98
| el1h_64_sync+0x64/0x68
| do_el0_svc+0x0/0x28
| el0t_64_sync_handler+0x84/0xf0
| el0t_64_sync+0x18c/0x190
| Kernel Offset: disabled
| CPU features: 0x0080,00005021,19001080
| Memory Limit: none
| ---[ end Kernel panic - not syncing: kernel stack overflow ]---With this patch, cortex_a76_erratum_1463225_debug_handler() is inlined
into el1_dbg(), and el1_dbg() cannot be probed:| # echo p cortex_a76_erratum_1463225_debug_handler > /sys/kernel/debug/tracing/kprobe_events
| sh: write error: No such file or directory
| # grep -w cortex_a76_errat
---truncated--- | [] | null | 7.8 | null | null |
|
CVE-2018-13711 | The mintToken function of a smart contract implementation for Databits, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:databits_project:databits:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2006-5630 | Hosting Controller 6.1 before Hotfix 3.3 allows remote attackers to (1) delete the virtual directory of an arbitrary site via a modified ForumID parameter in a disableforum action in DisableForum.asp and (2) create an arbitrary forum virtual directory via an empty ForumID parameter in an enableforum action in EnableForum.asp. | [
"cpe:2.3:a:hosting_controller:hosting_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:2002_rc_1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-cghm-v6v8-jp7r | In the Linux kernel, the following vulnerability has been resolved:fsdax: Fix infinite loop in dax_iomap_rw()I got an infinite loop and a WARNING report when executing a tail command
in virtiofs.WARNING: CPU: 10 PID: 964 at fs/iomap/iter.c:34 iomap_iter+0x3a2/0x3d0
Modules linked in:
CPU: 10 PID: 964 Comm: tail Not tainted 5.19.0-rc7
Call Trace:
<TASK>
dax_iomap_rw+0xea/0x620
? __this_cpu_preempt_check+0x13/0x20
fuse_dax_read_iter+0x47/0x80
fuse_file_read_iter+0xae/0xd0
new_sync_read+0xfe/0x180
? 0xffffffff81000000
vfs_read+0x14d/0x1a0
ksys_read+0x6d/0xf0
__x64_sys_read+0x1a/0x20
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcdThe tail command will call read() with a count of 0. In this case,
iomap_iter() will report this WARNING, and always return 1 which casuing
the infinite loop in dax_iomap_rw().Fixing by checking count whether is 0 in dax_iomap_rw(). | [] | null | 6.2 | null | null |
|
CVE-2019-15457 | The Samsung J6 Android device with a build fingerprint of samsung/j6ltexx/j6lte:8.0.0/R16NW/J600FNXXU3ASC1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [
"cpe:2.3:o:samsung:galaxy_j6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_j6:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
RHSA-2009:1469 | Red Hat Security Advisory: kernel security update | kernel: r8169: fix crash when large packets are received kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference | [
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2023:5001 | Red Hat Security Advisory: OpenShift Container Platform 4.11.49 bug fix and security update | exporter-toolkit: authentication bypass via cache poisoning | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
CVE-2012-2577 | Multiple cross-site scripting (XSS) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) before 10.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) syslocation, (2) syscontact, or (3) sysName field of an snmpd.conf file. | [
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:7.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-qxrm-rjv7-w3rx | A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by this vulnerability is the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 8.8 | null | null |
|
GHSA-wcmj-f23c-wrx2 | The Paid Memberships Pro WordPress plugin before 2.9.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] | null | 5.4 | null | null |
|
CVE-2024-32135 | WordPress Disable Comments | WPZest plugin <= 1.51 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPZest Disable Comments | WPZest.This issue affects Disable Comments | WPZest: from n/a through 1.51.
| [] | null | 7.6 | null | null |
RHSA-2024:11299 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
CVE-2025-24670 | WordPress Term Taxonomy Converter Plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dhanendran Rajagopal Term Taxonomy Converter allows Reflected XSS. This issue affects Term Taxonomy Converter: from n/a through 1.2. | [] | null | 7.1 | null | null |
RHSA-2019:0711 | Red Hat Security Advisory: openssh security update | openssh: User enumeration via malformed packets in authentication requests | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
GHSA-m982-h4f8-g4hf | Generation of Error Message Containing Sensitive Information in janeczku/calibre-web | A vulnerability in janeczku/calibre-web allows unauthorized users to view the names of private shelves belonging to other users. This issue occurs in the file shelf.py at line 221, where the name of the shelf is exposed in an error message when a user attempts to remove a book from a shelf they do not own. This vulnerability discloses private information and affects all versions prior to the fix. | [] | null | 4.3 | null | null |
CVE-2006-6414 | Multiple SQL injection vulnerabilities in dettaglio.asp in dol storye allow remote attackers to execute arbitrary SQL commands via the (1) id_doc or (2) id_aut parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:dol_storye:dol_storye:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7p85-rcff-vxq4 | In CAacDecoder_DecodeFrame of aacdecode.cpp, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution in the media server with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112891564 | [] | null | null | 8.8 | null |
|
CVE-2002-1141 | An input validation error in the Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote attackers to cause a denial of service via malformed fragmented RPC client packets, aka "Denial of service by sending an invalid RPC request." | [
"cpe:2.3:a:microsoft:services:3.0:*:unix:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-20380 | ClamAV HTML Parser Denial of Service Vulnerability | A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software. | [
"cpe:2.3:a:cisco:clam_antivirus:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-w62x-587h-wg93 | Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.2 allow remote attackers to cause a denial of service (device reload) via a high rate of crafted packets, aka Bug ID CSCui06507. | [] | null | null | null | null |
|
GHSA-hpwc-68gr-45h5 | An XSS issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application doesn't properly check parameters, sent in a /dvcset/sysset/set.cgi POST request via the arg01.Hostname field, before saving them on the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser. | [] | null | 6.1 | null | null |
|
CVE-2021-33894 | In Progress MOVEit Transfer before 2019.0.6 (11.0.6), 2019.1.x before 2019.1.5 (11.1.5), 2019.2.x before 2019.2.2 (11.2.2), 2020.x before 2020.0.5 (12.0.5), 2020.1.x before 2020.1.4 (12.1.4), and 2021.x before 2021.0.1 (13.0.1), a SQL injection vulnerability exists in SILUtility.vb in MOVEit.DMZ.WebApp in the MOVEit Transfer web app. This could allow an authenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database and/or execute SQL statements that alter or delete database elements. | [
"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2017-12804 | The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file. | [
"cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2025-24594 | WordPress Linet ERP-Woocommerce Integration plugin <= 3.5.7 - CSRF to Broken Access Control vulnerability | Missing Authorization vulnerability in Speedcomp Linet ERP-Woocommerce Integration allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.7. | [] | null | 6.5 | null | null |
GHSA-3gfm-x3mg-hww2 | Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability." | [] | null | null | null | null |
|
GHSA-v263-ghf9-h2rx | libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_strInitUtf8 at string.c. | [] | null | 8.8 | null | null |
|
CVE-2018-2570 | Vulnerability in the Oracle Communications Unified Inventory Management component of Oracle Communications Applications (subcomponent: Portal). Supported versions that are affected are 7.2.4.2.x and 7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Unified Inventory Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Unified Inventory Management accessible data as well as unauthorized read access to a subset of Oracle Communications Unified Inventory Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Unified Inventory Management. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.5 |
|
GHSA-8qx3-cq4j-g455 | A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. | [] | null | 7.8 | null | null |
|
GHSA-j6r6-8wjh-8gcw | A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via webmaster-tools.php in the "to_time" parameter. | [] | null | null | null | null |
|
GHSA-vjf4-chxp-cg8g | jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media. | [] | null | null | null | null |
|
CVE-2018-11538 | servlet/UserServlet in SearchBlox 8.6.6 has CSRF via the u_name, u_passwd1, u_passwd2, role, and X-XSRF-TOKEN POST parameters because of CSRF Token Bypass. | [
"cpe:2.3:a:searchblox:searchblox:8.6.6:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2023-48950 | An issue in the box_col_len function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | [
"cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2009-1773 | activeCollab 2.1 Corporate allows remote attackers to obtain sensitive information via an invalid re_route parameter to the login script, which reveals the installation path in an error message. | [
"cpe:2.3:a:activecollab:activecollab:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.