id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2017-8120 | The UMA product with software V200R001 and V300R001 has a privilege elevation vulnerability due to insufficient validation or improper processing of parameters. An attacker could craft specific packets to exploit these vulnerabilities to gain elevated privileges. | [
"cpe:2.3:a:huawei:uma:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:uma:v300r001:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-gmqq-hrf4-4gvf | When a BIG-IP ASM or Advanced WAF system running version 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, or 11.6.1-11.6.5.2 processes requests with JSON payload, an unusually large number of parameters can cause excessive CPU usage in the BIG-IP ASM bd process. | [] | null | null | null | null |
|
GHSA-8fjv-wq5r-qw46 | SMBClient in SMB in Apple OS X before 10.11 allows local users to obtain sensitive kernel memory-layout information via unspecified vectors. | [] | null | null | null | null |
|
GHSA-jrrf-cwx7-w6gp | Agentejo Cockpit lacks an anti-CSRF protection mechanism. Thus, an attacker is able to change API tokens, passwords, etc. | [] | null | null | 8.8 | null |
|
CVE-2024-49508 | InDesign Desktop | Heap-based Buffer Overflow (CWE-122) | InDesign Desktop versions ID18.5.2, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-6gvc-4jvj-pwq4 | Use after free in libpulse-binding | An issue was discovered in the libpulse-binding crate before 2.5.0 for Rust. proplist::Iterator can cause a use-after-free. | [] | null | 6.5 | null | null |
CVE-2022-47780 | SQL Injection vulnerability in Bangresto 1.0 via the itemID parameter. | [
"cpe:2.3:a:bangresto_project:bangresto:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-vwmw-f3cr-593g | The Email Encoder – Protect Email Addresses WordPress plugin before 2.1.2 has an endpoint that requires no authentication and will render a user supplied value in the HTML response without escaping or sanitizing the data. | [] | null | null | null | null |
|
CVE-2017-11405 | In CMS Made Simple (CMSMS) 2.2.2, remote authenticated administrators can upload a .php file via a CMSContentManager action to admin/moduleinterface.php, followed by a FilePicker action to admin/moduleinterface.php in which type=image is changed to type=file. | [
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.2:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 |
|
GHSA-m4g4-hvch-vhgf | TSplus Remote Work 16.0.0.0 has weak permissions for .exe, .js, and .html files under the %PROGRAMFILES(X86)%\TSplus-RemoteWork\Clients\www folder. This may enable privilege escalation if a different local user modifies a file. NOTE: CVE-2023-31067 and CVE-2023-31068 are only about the TSplus Remote Access product, not the TSplus Remote Work product. | [] | null | 9.8 | null | null |
|
GHSA-7qm4-r332-p54j | The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the booking_export_all() function in all versions up to, and including, 3.4.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve all event booking which can contain PII. | [] | null | 4.3 | null | null |
|
GHSA-3h47-86qq-gprm | Google Chrome before 14.0.835.163 does not properly handle Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node." | [] | null | null | null | null |
|
GHSA-hq49-5fpc-c85q | Directory traversal vulnerability in pdesk.cgi in PerlDesk allows remote attackers to read portions of arbitrary files and possibly execute arbitrary Perl modules via ".." sequences terminated by a %00 (null) character in the lang parameter, which can leak portions of the requested files if a compilation error message occurs. | [] | null | null | null | null |
|
CVE-2023-6364 | WhatsUp Gold Stored Cross-Site Scripting (XSS) via Dashboard | In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within a dashboard component.
If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
| [
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
CVE-2017-13212 | An elevation of privilege vulnerability in the Android system (systemui). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62187985. | [
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2024-38582 | nilfs2: fix potential hang in nilfs_detach_log_writer() | In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix potential hang in nilfs_detach_log_writer()
Syzbot has reported a potential hang in nilfs_detach_log_writer() called
during nilfs2 unmount.
Analysis revealed that this is because nilfs_segctor_sync(), which
synchronizes with the log writer thread, can be called after
nilfs_segctor_destroy() terminates that thread, as shown in the call trace
below:
nilfs_detach_log_writer
nilfs_segctor_destroy
nilfs_segctor_kill_thread --> Shut down log writer thread
flush_work
nilfs_iput_work_func
nilfs_dispose_list
iput
nilfs_evict_inode
nilfs_transaction_commit
nilfs_construct_segment (if inode needs sync)
nilfs_segctor_sync --> Attempt to synchronize with
log writer thread
*** DEADLOCK ***
Fix this issue by changing nilfs_segctor_sync() so that the log writer
thread returns normally without synchronizing after it terminates, and by
forcing tasks that are already waiting to complete once after the thread
terminates.
The skipped inode metadata flushout will then be processed together in the
subsequent cleanup work in nilfs_segctor_destroy(). | [] | null | 5.3 | null | null |
GHSA-qw86-xx8q-rx6f | Race condition in partmgr.sys in Windows Partition Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that makes multiple simultaneous Plug and Play (PnP) Configuration Manager function calls, aka "Plug and Play (PnP) Configuration Manager Vulnerability." | [] | null | null | null | null |
|
CVE-2006-0085 | SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin parameters. | [
"cpe:2.3:a:nkads:nkads:1.0alfa2:*:*:*:*:*:*:*",
"cpe:2.3:a:nkads:nkads:1.0alfa3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2p7w-jv73-hf6h | An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. | [] | null | 7.5 | null | null |
|
RHSA-2018:1643 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.5 | null |
GHSA-jppv-6qwm-92v8 | Unspecified vulnerability in the Siebel Life Sciences component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Clinical Trip Report. | [] | null | null | null | null |
|
GHSA-j2gr-xwwh-944x | Multiple PHP remote file inclusion vulnerabilities in SH-News 3.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the scriptpath parameter to (1) report.php, (2) archive.php, (3) comments.php, (4) init.php, or (5) news.php. | [] | null | null | null | null |
|
CVE-2023-39841 | Missing encryption in the RFID tag of Etekcity 3-in-1 Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device. | [
"cpe:2.3:o:etekcity:3-in-1_smart_door_lock_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:etekcity:3-in-1_smart_door_lock:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
CVE-2016-2015 | HPE System Management Homepage before 7.5.5 allows local users to obtain sensitive information or modify data via unspecified vectors. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | 6.6 |
|
CVE-2014-7009 | The HKBN My Account (aka com.hkbn.myaccount) application @7F070015 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:hkbn:hkbn_my_account:\\@7f070015:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-3f2c-jm6v-cr35 | Django DNS Rebinding Vulnerability | Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS. | [] | 9.2 | null | 8.1 | null |
CVE-2018-10313 | WUZHI CMS 4.1.0 allows persistent XSS via the form%5Bqq_10%5D parameter to the /index.php?m=member&f=index&v=profile&set_iframe=1 URI. | [
"cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2022-25172 | An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie. | [
"cpe:2.3:o:inhandnetworks:ir302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:inhandnetworks:ir302:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-4vf2-qfg3-7598 | symfony/validator XML Entity Expansion vulnerability | Symfony 2.0.11 carried a [similar] XXE security fix, however, on review of ZF2 I also noted a vulnerability to XML Entity Expansion (XEE) attacks whereby all extensions making use of libxml2 have no defense against XEE Quadratic Blowup Attacks. The vulnerability is a function of there being no current method of disabling custom entities in PHP (i.e. defined internal to the XML document without using external entities). In a QBA, a long entity can be defined and then referred to multiple times in document elements, creating a memory sink with which Denial Of Service attacks against a host's RAM can be mounted. The use of the LIBXML_NOENT or equivalent option in a dependent extension amplified the impact (it doesn't actually mean "No Entities"). In addition, libxml2's innate defense against the related Exponential or Billion Laugh's XEE attacks is active only so long as the LIBXML_PARSEHUGE is NOT set (it disables libxml2's hardcoded entity recursion limit). No instances of these two options were noted, but it's worth referencing for the future.Consider this (non-fatal) example:Increase the length of entity, and entity count to a few hundred, and peak memory usage will waste no time spiking the moment the nodeValue for is accessed since the entities will then be expanded by a simple multiplier effect. No external entities required....This can be used in combination with the usual XXE defense of calling libxml_disable_entity_loader(TRUE) and, optionally, the LIBXML_NONET option (should local filesystem access be allowable). The DOCTYPE may be removed instead of rejecting the XML outright but this would likely result in other problems with the unresolved entities. "If you cannot upgrade to the latest Symfony version, you can also apply this [patch](https://github.com/symfony/symfony/compare/352e8f583c87c709de197bb16c4053d2e87fd4cd...5bf4f92e86c34690d71e8f94350ec975909a435b.diff). | [] | null | 7.5 | null | null |
CVE-2021-23977 | Firefox for Android suffered from a time-of-check-time-of-use vulnerability that allowed a malicious application to read sensitive data from application directories. Note: This issue is only affected Firefox for Android. Other operating systems are unaffected. This vulnerability affects Firefox < 86. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*"
] | null | 5.3 | null | 2.6 |
|
CVE-2018-0154 | A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267. | [
"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cbr8_converged_broadband_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-5h7g-3542-fw4q | This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions. | [] | null | 9.8 | null | null |
|
CVE-2021-41278 | Broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors | Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform. In affected versions broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation. Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform. | [
"cpe:2.3:a:edgexfoundry:app_service_configurable:*:*:*:*:*:go:*:*",
"cpe:2.3:a:edgexfoundry:application_functions_software_development_kit:*:*:*:*:*:go:*:*",
"cpe:2.3:a:edgexfoundry:edgex_foundry:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
CVE-2021-39289 | Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800. | [
"cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-363m-3jp4-qg24 | Themify WordPress plugin before 1.4.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [] | null | 4.8 | null | null |
|
GHSA-rcf3-vv2f-fwg2 | Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations. | [] | null | null | null | null |
|
GHSA-qwr4-m8jc-p6rf | Possibility of heap-buffer-overflow during last iteration of loop while populating image version information in diag command response packet, in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MDM9607, MDM9640, MSM8909W, MSM8917, MSM8953, Nicobar, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDM429, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [] | null | null | null | null |
|
GHSA-5g57-6fp4-37vq | In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326314; Issue ID: ALPS07326314. | [] | null | 6.7 | null | null |
|
GHSA-696j-q33c-pvm7 | There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | [] | null | 7.5 | null | null |
|
GHSA-8phr-7v4m-7r33 | An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution. | [] | null | null | 9.8 | null |
|
GHSA-frh8-qg35-vhhg | A code injection vulnerability in the SeDebugPrivilege component of Trezor Bridge 2.0.27 allows attackers to escalate privileges. | [] | null | null | null | null |
|
CVE-2006-0083 | Format string vulnerability in the logging code of SMS Server Tools (smstools) 1.14.8 and earlier allows local users to execute arbitrary code via unspecified attack vectors. | [
"cpe:2.3:a:stefan_frings:sms_server_tools:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-qp25-xm2x-r33g | Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68. | [] | null | 5.3 | null | null |
|
CVE-2023-6122 | Reflected XSS in Softomi E-commerce Software | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Gelişmiş C2C Pazaryeri Yazılımı allows Reflected XSS.This issue affects Softomi Gelişmiş C2C Pazaryeri Yazılımı: before 12122023.
| [
"cpe:2.3:a:softomi:advanced_c2c_marketplace_software:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2016-4625 | Use-after-free vulnerability in IOSurface in Apple OS X before 10.11.6 allows local users to gain privileges via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2007-2993 | Multiple cross-site scripting (XSS) vulnerabilities in OmegaMw7.asp in OMEGA (aka Omegasoft) INterneSErvicesLosungen (INSEL) allow remote attackers to inject arbitrary web script or HTML via (1) user-created text fields; the (2) F05003, (3) F05005, and (4) F05015 fields; and other unspecified standard fields. | [
"cpe:2.3:a:omegasoft:interneserviceslosungen:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2013-3286 | Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum eRoom before 7.4.4 P11 allow remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:emc:documentum_eroom:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_eroom:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_eroom:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_eroom:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_eroom:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_eroom:7.4.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-5f74-2734-278c | IBM CICS TX 11.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229463. | [] | null | 7.5 | null | null |
|
CVE-2017-12958 | There is an illegal address access in the function output_hex() in data/data-out.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service. | [
"cpe:2.3:a:gnu:pspp:0.11.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2020-9245 | HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8) have a denial of service vulnerability. Certain system configuration can be modified because of improper authorization. The attacker could trick the user installing and executing a malicious application, successful exploit could cause a denial of service condition of PHONE function. | [
"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-m33h-2h9f-7w8c | Cross-Site Request Forgery (CSRF) vulnerability in OptiMonk OptiMonk: Popups, Personalization & A/B Testing plugin <= 2.0.4 versions. | [] | null | 4.3 | null | null |
|
CVE-2009-0200 | Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow. | [
"cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0-ru:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.84:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.87:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.91:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.93:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.95:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.100:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.104:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.113:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.118:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.122:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.130:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.156:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.680:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.1.154:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:64-bit:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:605b:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:609:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:614:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:619:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:627:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:633:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:638:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:638c:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:641b:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:641d:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:643:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2021-1641 | Microsoft SharePoint Server Spoofing Vulnerability | Microsoft SharePoint Server Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*"
] | null | 4.6 | null | null |
CVE-2014-6733 | The My T-Mobile (aka at.tmobile.android.myt) application @7F0C0030 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:t-mobile:my_t-mobile:\\@7f0c0030:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2024-30001 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
CVE-2024-3365 | SourceCodester Online Library System controller.php cross site scripting | A vulnerability was found in SourceCodester Online Library System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin/users/controller.php. The manipulation of the argument user_name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259469 was assigned to this vulnerability. | [
"cpe:2.3:a:online_library_system_project:online_library_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2023-41950 | WordPress Laposta Signup Basic Plugin <= 1.4.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Laposta - Roel Bousardt Laposta Signup Basic plugin <= 1.4.1 versions. | [
"cpe:2.3:a:laposta:laposta_signup_basic:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2025-5636 | PCMan FTP Server SET Command buffer overflow | A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component SET Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
RHSA-2016:2599 | Red Hat Security Advisory: tomcat security, bug fix, and enhancement update | tomcat: non-persistent DoS attack by feeding data by aborting an upload tomcat: URL Normalization issue tomcat: directory disclosure tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
CVE-2020-10067 | Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory | A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. | [
"cpe:2.3:o:zephyrproject:zephyr:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-gpxc-4jh8-3592 | In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while parsing a Measurement Request IE in a Roam Neighbor Action Report, a buffer overflow can occur. | [] | null | null | 7.8 | null |
|
GHSA-qcrj-6ffc-v7hq | Craft CMS Stored Cross-site Scripting Injection Vulnerability | Summary_When you insert a payload inside a label name or instruction of an entry type, an XSS happens in the quick post widget on the
admin dashboard._PoC[_Complete instructions, including specific configuration details, to reproduce the vulnerability._](https://user-images.githubusercontent.com/53917092/215604129-d5b75608-5a24-4eb3-906f-55b192310298.mp4)ImpactTested with the free version of Craft CMS 4.3.6.1 | [] | null | 6.1 | null | null |
GHSA-whjp-5gj5-fqm7 | Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote attackers to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6 device, aka Bug ID CSCuj01046. | [] | null | null | null | null |
|
CVE-2002-1672 | Webmin 0.92, when installed from an RPM, creates /var/webmin with insecure permissions (world readable), which could allow local users to read the root user's cookie-based authentication credentials and possibly hijack the root user's session using the credentials. | [
"cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
ICSA-23-131-02 | Siemens SCALANCE W1750D | The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. | [] | null | 8.4 | null | null |
GHSA-7q6x-5wq3-w7mh | Dell PowerScale OneFS, 8.2.2 - 9.3.0.x, contain a missing release of memory after effective lifetime vulnerability. An authenticated user with ISI_PRIV_LOGIN_SSH and/or ISI_PRIV_LOGIN_CONSOLE and ISI_PRIV_AUTH_PROVIDERS privileges could exploit this vulnerability, leading to a Denial-Of-Service. This can also impact a cluster in Compliance mode. Dell recommends to update at the earliest opportunity. | [] | null | 6.5 | null | null |
|
CVE-2013-5443 | Cross-site request forgery (CSRF) vulnerability in IBM Cognos Express 9.0 before IFIX 2, 9.5 before IFIX 2, 10.1 before IFIX 2, and 10.2.1 before FP1 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:ibm:cognos_express:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_express:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_express:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_express:10.2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-x6cj-gx36-vcxv | Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 3.7 | null | null |
|
GHSA-v78m-2q7v-fjqp | Uncontrolled Recursion in rulex | ImpactWhen parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately.This is a security concern for you, ifyour service parses untrusted rulex expressions (expressions provided by an untrusted user), andyour service becomes unavailable when the process running rulex aborts due to a stack overflow.PatchesThe crash is fixed in version **0.4.3**. Affected users are advised to update to this version.WorkaroundsNone.For more informationIf you have any questions or comments about this advisory:Open an issue in [rulex](https://github.com/rulex-rs/rulex/issues)Email me at [[email protected]](mailto:[email protected])CreditsCredit for finding these bugs goes to[evanrichter](https://github.com/evanrichter)[ForAllSecure Mayhem](https://forallsecure.com/)[cargo fuzz](https://github.com/rust-fuzz/cargo-fuzz) and [afl.rs](https://github.com/rust-fuzz/afl.rs) | [] | null | 6.5 | null | null |
CVE-2011-4584 | The MNET authentication functionality in Moodle 1.9.x before 1.9.15, 2.0.x before 2.0.6, and 2.1.x before 2.1.3 allows remote authenticated users to impersonate other user accounts by using the Login As feature in conjunction with a remote MNET single sign-on capability, as demonstrated by a Mahara site. | [
"cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-394j-x37r-2q27 | Ibexa DXP users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.The role / assign policy is typically only given to administrators, which limits the scope in most cases, but please verify who has this policy in your installaton. The fix ensures that subtree limitations are working as intended. | [] | null | null | null | null |
GHSA-849r-jpqc-fm29 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | [] | null | 5.8 | null | null |
|
CVE-2024-0376 | The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Wrapper Link Widget in all versions up to, and including, 4.10.16 due to insufficient input sanitization and output escaping on user supplied URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
GHSA-5qm8-v274-4wjj | Buffer overflow in Flash OCX for Macromedia Flash 6 revision 23 (6,0,23,0) allows remote attackers to execute arbitrary code via a long movie parameter. | [] | null | null | null | null |
|
GHSA-px2w-wv2v-r557 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer EO4WP allows Stored XSS.This issue affects EO4WP: from n/a through 1.0.7. | [] | null | 6.5 | null | null |
|
GHSA-m8qw-pv9v-5gw3 | Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load. | [] | null | null | null | null |
|
GHSA-m7p2-3h69-2354 | An elevation of privilege vulnerability in the Qualcomm IPA driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33139056. References: QC-CR#1097714. | [] | null | null | 7 | null |
|
CVE-2021-44926 | A null pointer dereference vulnerability exists in gpac 1.1.0-DEV in the gf_node_get_tag function, which causes a segmentation fault and application crash. | [
"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2022-47762 | In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability. | [
"cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2020-6408 | Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-37043 | QTS, QuTS hero | A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read the contents of unexpected files and expose sensitive data.
We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later | [] | 5.1 | null | null | null |
CVE-2005-4249 | ADP Forum 2.0 through 2.0.3 stores sensitive information in plaintext files under the web document root with insufficient access control, which allows remote attackers to obtain user credentials via requests to the forum/users directory. | [
"cpe:2.3:a:adp:adp_forum:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adp:adp_forum:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adp:adp_forum:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adp:adp_forum:2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-30666 | Improper input validation vulnerability in DoOemImeiSetPreconfig in libsec-ril prior to SMR Jul-2023 Release 1 allows local attackers to cause an Out-Of-Bounds write. | [
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2023-32084 | HTTP.sys Denial of Service Vulnerability | HTTP.sys Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2022-49024 | can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods | In the Linux kernel, the following vulnerability has been resolved:
can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods
In m_can_pci_remove() and error handling path of m_can_pci_probe(),
m_can_class_free_dev() should be called to free resource allocated by
m_can_class_allocate_dev(), otherwise there will be memleak. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-8gfq-m4cf-w975 | Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a stored cross-site scripting vulnerability in the customer address upload feature that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | null | null | null |
|
CVE-2017-8695 | Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability." | [
"cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2011:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_2007:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_2010:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 2.6 |
|
CVE-2006-6108 | Cross-site scripting (XSS) vulnerability in EC-CUBE before 1.0.1a-beta allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors. | [
"cpe:2.3:a:ec-cube:ec-cube:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-6m4f-j9v5-qr3h | An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link. | [] | null | null | null | null |
|
GHSA-4vgj-rwj6-4gwr | A reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | [] | null | 6.1 | null | null |
|
CVE-2013-6035 | The firmware on GateHouse; Harris BGAN RF-7800B-VU204 and BGAN RF-7800B-DU204; Hughes Network Systems 9201, 9450, and 9502; Inmarsat; Japan Radio JUE-250 and JUE-500; and Thuraya IP satellite terminals does not require authentication for sessions on TCP port 1827, which allows remote attackers to execute arbitrary code via unspecified protocol operations. | [
"cpe:2.3:h:gatehouse:gatehouse:-:*:*:*:*:*:*:*",
"cpe:2.3:h:harris:bgan:rf-7800b-du204:*:*:*:*:*:*:*",
"cpe:2.3:h:harris:bgan:rf-7800b-vu204:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes_network_systems:9201:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes_network_systems:9450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes_network_systems:9502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:inmarsat:inmarsat:-:*:*:*:*:*:*:*",
"cpe:2.3:h:japan_radio:jue-250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:japan_radio:jue-500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:thuraya_telecommunications:ip:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2022-1797 | Rockwell Automation Logix Controllers Uncontrolled Resource Consumption | A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online. | [
"cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compactlogix_5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:controllogix_5570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:guardlogix_5570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix_5570:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
GHSA-24g3-3pph-m744 | Cross-site Scripting (XSS) vulnerability in GUI of Secomea SiteManager could allow an attacker to cause an XSS Attack. This issue affects: Secomea SiteManager all versions prior to 9.3. | [] | null | null | null | null |
|
CVE-2022-1127 | Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2021-40521 | Airangel HSMX Gateway devices through 5.2.04 allow Remote Code Execution. | [
"cpe:2.3:o:airangel:hsmx-app-25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airangel:hsmx-app-25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airangel:hsmx-app-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airangel:hsmx-app-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airangel:hsmx-app-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airangel:hsmx-app-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airangel:hsmx-app-5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airangel:hsmx-app-5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airangel:hsmx-app-20000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airangel:hsmx-app-20000:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2024-50068 | mm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets() | In the Linux kernel, the following vulnerability has been resolved:
mm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets()
The sysfs_target->regions allocated in damon_sysfs_regions_alloc() is not
freed in damon_sysfs_test_add_targets(), which cause the following memory
leak, free it to fix it.
unreferenced object 0xffffff80c2a8db80 (size 96):
comm "kunit_try_catch", pid 187, jiffies 4294894363
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace (crc 0):
[<0000000001e3714d>] kmemleak_alloc+0x34/0x40
[<000000008e6835c1>] __kmalloc_cache_noprof+0x26c/0x2f4
[<000000001286d9f8>] damon_sysfs_test_add_targets+0x1cc/0x738
[<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac
[<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec
[<00000000adf936cf>] kthread+0x2e8/0x374
[<0000000041bb1628>] ret_from_fork+0x10/0x20 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2019-10431 | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts. | [
"cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*"
] | null | 9.9 | null | 6.5 |
|
CVE-2022-47968 | Heimdall Application Dashboard through 2.5.4 allows reflected and stored XSS via "Application name" to the "Add application" page. The stored XSS will be triggered in the "Application list" page. | [
"cpe:2.3:a:linuxserver:heimdall_application_dashboard:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-h2fj-p2f3-rmwc | XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file | [] | null | 5.3 | null | null |
|
GHSA-wc4q-pc87-7ch2 | A vulnerability classified as critical has been found in PHPGurukul Curfew e-Pass Management System 1.0. Affected is an unknown function of the file /admin/search-pass.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.