id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2021:0421
|
Red Hat Security Advisory: rh-nodejs14-nodejs security update
|
nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS nodejs-y18n: prototype pollution vulnerability nodejs-ini: Prototype pollution via malicious INI file nodejs: use-after-free in the TLS implementation c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS nodejs: HTTP request smuggling via two copies of a header field in an http request nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.6 | 4.3 | null | null |
GHSA-9q3j-vp3j-6rc7
|
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view/student_profile.php. The manipulation of the argument std_index leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-265102 is the identifier assigned to this vulnerability.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2022-42161
|
D-Link COVR 1200,1202,1203 v1.08 was discovered to contain a command injection vulnerability via the /SetTriggerWPS/PIN parameter at function SetTriggerWPS.
|
[
"cpe:2.3:o:dlink:covr_1203_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:covr_1202_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:covr_1200_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1200:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-41953
|
WordPress ProfilePress plugin <= 4.13.1 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress.This issue affects ProfilePress: from n/a through 4.13.1.
|
[
"cpe:2.3:a:profilepress:profilepress:*:*:*:*:pro:wordpress:*:*"
] | null | 5.3 | null | null | null |
CVE-2018-13341
|
Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior to 1.502.0047.00, The passwords for special sudo accounts may be calculated using information accessible to those with regular user privileges. Attackers could decipher these passwords, which may allow them to execute hidden API calls and escape the CTP console sandbox environment with elevated privileges.
|
[
"cpe:2.3:o:crestron:tsw-x60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-nc-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-nc-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-nc-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-nc-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-nc-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-nc-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:mc3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:mc3:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4 | null |
|
GHSA-45j4-484p-rcm6
|
The All in One B2B for WooCommerce WordPress plugin through 1.0.3 does not properly check nonce values in several actions, allowing an attacker to perform CSRF attacks.
|
[] | null | 8.8 | null | null | null |
|
CVE-2018-0355
|
A vulnerability in the web UI of Cisco Unified Communications Manager (Unified CM) could allow an unauthenticated, remote attacker to conduct a cross-frame scripting (XFS) attack against the user of the web UI of an affected system. The vulnerability is due to insufficient protections for HTML inline frames (iframes) by the web UI of the affected software. An attacker could exploit this vulnerability by persuading a user of the affected UI to navigate to an attacker-controlled web page that contains a malicious HTML iframe. A successful exploit could allow the attacker to conduct click-jacking or other client-side browser attacks on the affected system. Cisco Bug IDs: CSCvg19761.
|
[
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
RHSA-2022:8267
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: off-path attacker may inject data or terminate victim's TCP session kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: veth: ensure skb entering GRO are not cloned. kernel: inet: fully convert sk->sk_rx_dst to RCU rules kernel: irqchip/gic-v3-its: Fix potential VPE leak on error kernel: ptp: Fix possible memory leak in ptp_clock_register() kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() kernel: net: nexthop: fix null pointer dereference when IPv6 is not enabled kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU kernel: Revert "Revert "block, bfq: honor already-setup queue merges"" kernel: udmabuf: validate ubuf->pagecount kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() kernel: smb2_ioctl_query_info NULL pointer dereference kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: race condition in snd_pcm_hw_free leading to use-after-free kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources kernel: kernel info leak issue in pfkey_register kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: fanotify misuses fd_install() which could lead to use-after-free kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() kernel: LoadPin bypass via dm-verity table reload kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() kernel: media: em28xx: initialize refcount before kref_get kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) kernel: possible to use the debugger to write zero into a location of choice hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c hw: cpu: Intel: information disclosure via local access kernel: use after free in SUNRPC subsystem kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: nf_tables disallow binding to already bound chain kernel: netfilter: nfnetlink_osf: uninitialized variable information disclosure vulnerability kernel: ALSA: hda: Fix UAF of leds class devs at unbinding kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts kernel: ibmvnic: free reset-work-item when flushing kernel: netfilter: fix use-after-free in __nf_register_net_hook() kernel: iwlwifi: mvm: check debugfs_dir ptr before use kernel: sched/fair: Fix fault in reweight_entity kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: KVM: x86/mmu: make apf token non-zero to fix bug kernel: block: null_blk: end timed out poll request kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() kernel: veth: Ensure eth header is in skb's linear part kernel: net: openvswitch: fix leak of nested actions kernel: arch/arm64: Fix topology initialization for core scheduling kernel: skbuff: fix coalescing for page_pool fragment recycling kernel: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error kernel: ceph: fix inode reference leakage in ceph_get_snapdir() kernel: dm ioctl: prevent potential spectre v1 gadget kernel: ath11k: Fix frames flush failure caused by deadlock kernel: mt76: mt7921: fix crash when startup fails. kernel: ath11k: mhi: use mhi_sync_power_up() kernel: net: preserve skb_end_offset() in skb_unclone_keeptruesize() kernel: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data kernel: block: Fix the maximum minor value is blk_alloc_ext_minor() kernel: XArray: Fix xas_create_range() when multi-order entry present kernel: wireguard: socket: free skb in send6 when ipv6 is disabled kernel: scsi: qla2xxx: Fix scheduling while atomic kernel: scsi: qla2xxx: Fix warning message due to adisc being flushed kernel: scsi: qla2xxx: Fix crash during module load unload test kernel: PM: core: keep irq flags in device_pm_check_callbacks() kernel: block, bfq: don't move oom_bfqq kernel: LSM: general protection fault in legacy_parse_param kernel: remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() kernel: xsk: Fix race at socket teardown kernel: igc: avoid kernel warning when changing RX ring parameters kernel: bpf: Fix a btf decl_tag bug when tagging a function kernel: ptp: unregister virtual clocks when unregistering physical clock. kernel: ath9k_htc: fix uninit value bugs kernel: ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855 kernel: media: usb: go7007: s2250-board: fix leak in probe() kernel: block: don't delete queue kobject before its children kernel: brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path kernel: exec: Force single empty string when argv is empty kernel: ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM kernel: ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes kernel: mac80211: fix potential double free on mesh join kernel: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls kernel: nbd: fix io hung while disconnecting device kernel: usb: dwc3: host: Stop setting the ACPI companion kernel: tcp: add accessors to read/set tp->snd_cwnd kernel: tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd kernel: scsi: lpfc: Address NULL pointer dereference after starget_to_rport() kernel: mm/huge_memory: Fix xarray node memory leak kernel: ip_gre: test csum_start instead of transport header kernel: ext4: avoid cycles in directory h-tree kernel: ext4: fix bug_on in ext4_writepages kernel: ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state kernel: ext4: fix use-after-free in ext4_rename_dir_prepare kernel: tipc: check attribute length for bearer name kernel: sfc: fix considering that all channels have TX queues kernel: usb: usbip: fix a refcount leak in stub_probe() kernel: blk-iolatency: Fix inflight count imbalances and IO hangs on offline kernel: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback kernel: RDMA/hfi1: Fix potential integer multiplication overflow errors kernel: ext4: fix memory leak in parse_apply_sb_mount_options() kernel: ext4: fix bug_on in __es_tree_search kernel: bfq: Avoid merging queues with different parents kernel: bfq: Update cgroup information before merging bio kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free kernel: RDMA/hfi1: Prevent use of lock before it is initialized kernel: firmware: arm_scmi: Fix list protocols enumeration in the base protocol kernel: blk-throttle: Set BIO_THROTTLED when bio has been throttled kernel: scsi: lpfc: Inhibit aborts if external loopback plug is inserted kernel: ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t kernel: loop: implement ->free_disk kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock kernel: scsi: lpfc: Fix call trace observed during I/O with CMF enabled kernel: ALSA: jack: Access input_dev under mutex kernel: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() kernel: ALSA: usb-audio: Cancel pending work at closing a MIDI substream kernel: x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave) kernel: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2 kernel: netfilter: conntrack: re-fetch conntrack after insertion kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero kernel: igc: Reinstate IGC_REMOVED logic and implement it properly kernel: RDMA/irdma: Fix sleep from invalid context BUG kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error kernel: sfc: fix kernel panic when creating VF kernel: sfc: fix use after free when disabling sriov kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() kernel: tipc: move bc link creation back to tipc_node_create kernel: mptcp: fix race on unaccepted mptcp sockets kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen kernel: dm raid: fix KASAN warning in raid5_add_disks kernel: erspan: do not assume transport header is always set kernel: igb: fix a use-after-free issue in igb_clean_tx_ring kernel: bpf: Fix request_sock leak in sk lookup helpers kernel: netfilter: use get_random_u32 instead of prandom kernel: ext4: add reserved GDT blocks check kernel: ext4: fix bug_on ext4_mb_use_inode_pa kernel: dm mirror log: round up region bitmap size to BITS_PER_LONG kernel: sock: redo the psock vs ULP protection check kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work kernel: netfilter: nft_tproxy: restrict to prerouting hook kernel: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE kernel: netfilter: nf_tables: possible module reference underflow in error path kernel: dm raid: fix address sanitizer warning in raid_resume kernel: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback kernel: posix-cpu-timers: Cleanup CPU timers before freeing them during exec kernel: ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes kernel: wifi: rtw89: 8852a: rfk: fix div 0 exception kernel: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb kernel: ath11k: fix netdev open race kernel: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table kernel: netfilter: nf_tables: do not allow SET_ID to refer to another table kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf() hw: Intel: Improper restriction in memory buffer in graphics drivers cause escalation of privilege
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null | null |
CVE-2016-8722
|
An exploitable Information Disclosure vulnerability exists in the Web Application functionality of Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client. Retrieving a specific URL without authentication can reveal sensitive information to an attacker.
|
[
"cpe:2.3:o:moxa:awk-3131a_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
|
CVE-2025-4919
|
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability affects Firefox < 138.0.4, Firefox ESR < 128.10.1, Firefox ESR < 115.23.1, Thunderbird < 128.10.2, and Thunderbird < 138.0.2.
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-45379
|
Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password.
|
[
"cpe:2.3:a:glewlwyd_project:glewlwyd:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-m32p-687w-44q9
|
SAP CCMS Monitoring (BC-CCM-MON) has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2020-16046
|
Script injection in iOSWeb in Google Chrome on iOS prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-26864
|
Apache IoTDB: Exposure of Sensitive Information in IoTDB OpenID Authentication
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Information into Log File vulnerability in the OpenIdAuthorizer of Apache IoTDB.
This issue affects Apache IoTDB: from 0.10.0 through 1.3.3, from 2.0.1-beta before 2.0.2.
Users are recommended to upgrade to version 1.3.4 and 2.0.2, which fix the issue.
|
[] | null | 7.5 | null | null | null |
CVE-2015-0728
|
Cross-site scripting (XSS) vulnerability in Cisco Access Control Server (ACS) 5.5(0.1) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuu11002.
|
[
"cpe:2.3:a:cisco:secure_access_control_system:5.5\\(0.1\\):*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6xg4-555m-qm52
|
Cross-Site Request Forgery (CSRF) vulnerability in Optimal Access Inc. KBucket allows Stored XSS. This issue affects KBucket: from n/a through 4.1.6.
|
[] | null | 7.1 | null | null | null |
|
CVE-2006-4598
|
Multiple SQL injection vulnerabilities in links.php in ssLinks 1.22 allow remote attackers to execute arbitrary SQL commands via the (1) go parameter and (2) id parameter in a rate action.
|
[
"cpe:2.3:a:sslinks:sslinks:1.22:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wmmv-6988-fqcv
|
ASUS RT-AC86U has improper user request handling, which allows an unauthenticated LAN attacker to cause a denial of service by sending particular request a server-to-client reply attempt.
|
[] | null | 6.5 | null | null | null |
|
CVE-2015-4091
|
XML external entity (XXE) vulnerability in SAP NetWeaver AS Java 7.4 allows remote attackers to send TCP requests to intranet servers or possibly have unspecified other impact via an XML request to tc~sld~wd~main/Main, related to "CIM UPLOAD," aka SAP Security Note 2090851.
|
[
"cpe:2.3:a:sap:sap_netweaver_application_server_java:7.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-3vcr-m67m-mr3p
|
Format string vulnerability in ePO service for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request with format strings in the computerlist parameter, which are used when logging a failed name resolution.
|
[] | null | null | null | null | null |
|
CVE-2022-31770
|
IBM App Connect Enterprise Certified Container 4.2 could allow a user from the administration console to cause a denial of service by creating a specially crafted request. IBM X-Force ID: 228221.
|
[
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*"
] | null | null | 4.9 | null | null |
|
GHSA-p38p-3wjq-f9p2
|
Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.7 and 11.1.1.8 allows remote attackers to affect confidentiality via unknown vectors related to People Connection.
|
[] | null | null | null | null | null |
|
GHSA-2rr5-8q37-2w7h
|
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
|
SeverityThe Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.)ImpactIn Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default.Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected:Nokogiri::XML::SAX::ParserNokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::ParserNokogiri::XML::SAX::PushParserNokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParserMitigationJRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier.CRuby users are not affected.
|
[] | null | null | 7.5 | null | null |
GHSA-j96r-f3m8-gwxp
|
The Smush WordPress plugin before 3.9.9 does not sanitise and escape a configuration parameter before outputting it back in an admin page when uploading a malicious preset configuration, leading to a Reflected Cross-Site Scripting. For the attack to be successful, an attacker would need an admin to upload a malicious configuration file
|
[] | null | 6.1 | null | null | null |
|
GHSA-7jxw-p9gh-w2j6
|
Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page.
|
[] | null | 5.4 | null | null | null |
|
CVE-2008-2934
|
Mozilla Firefox 3 before 3.0.1 on Mac OS X allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file that triggers a free of an uninitialized pointer.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2014-7321
|
The Firenze map (aka com.wFirenzemap) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:offertaviaggi:firenze_map:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-q72f-m8rg-wc5r
|
Unity before 7.2.1, as used in Ubuntu 14.04, does not properly restrict access to the Dash when the lock screen is active, which allows physically proximate attackers to bypass the lock screen and execute arbitrary commands, as demonstrated by pressing the SUPER key before the screen auto-locks.
|
[] | null | null | null | null | null |
|
GHSA-vcff-c3pp-m363
|
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1411.
|
[] | null | 7.8 | null | null | null |
|
CVE-2008-1967
|
Cross-site scripting (XSS) vulnerability in CFLogon/CFLogon.asp in Cezanne 6.5.1 and 7 allows remote attackers to inject arbitrary web script or HTML via the SleUserName parameter.
|
[
"cpe:2.3:a:cezannesw:cezanne:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cezannesw:cezanne:7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-8885-3g6h-5g9c
|
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.
|
[] | null | null | null | null | null |
|
GHSA-3h6c-6qpq-hv5j
|
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | null | 3.8 | null | null | null |
|
CVE-2019-7909
|
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to email templates.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2008-6585
|
Cross-site request forgery (CSRF) vulnerability in html/admin.php in TorrentFlux 2.3 allows remote attackers to hijack the authentication of administrators for requests that add new accounts via the addUser action.
|
[
"cpe:2.3:a:torrentflux:torrentflux:2.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-22153
|
SRX Series and MX Series with SPC3: A high percentage of fragments might lead to high latency or packet drops
|
An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.
|
[
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-36459
|
Cross-Site Scripting Vulnerability in Symantec SiteMinder Web Agent
|
A CRLF cross-site scripting vulnerability has been identified in certain configurations of the SiteMinder Web Agent for IIS Web Server and SiteMinder Web Agent for Domino Web Server. As a result, an attacker can execute arbitrary Javascript code in a client browser.
|
[
"cpe:2.3:a:broadcom:symantec_siteminder:*:*:*:*:*:*:*:*"
] | 8.4 | null | null | null | null |
GHSA-pgj2-fwxq-v5vr
|
The YOP Poll plugin for WordPress is vulnerable to a race condition in all versions up to, and including, 6.5.26. This is due to improper restrictions on the add() function. This makes it possible for unauthenticated attackers to place multiple votes on a single poll even when the poll is set to one vote per person.
|
[] | null | 5.3 | null | null | null |
|
GHSA-7cqh-9wjj-hhf9
|
vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[] | null | null | null | null | null |
|
GHSA-r4r9-268q-qj6x
|
Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow information disclosure during parsing of ICMP packets in prvProcessICMPPacket.
|
[] | null | null | 5.9 | null | null |
|
GHSA-6mq7-238w-j3cr
|
Multiple SQL injection vulnerabilities in Exponent CMS before 2.4.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in an activate_address address controller action, (2) title parameter in a show blog controller action, or (3) content_id parameter in a showComments expComment controller action.
|
[] | null | null | 9.8 | null | null |
|
GHSA-fpgc-429h-239x
|
IBM Security Network Protection 5.1.x and 5.2.x before 5.2.0.0 FP5 and 5.3.x before 5.3.0.0 FP1 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-gff2-2v38-hmc4
|
Windows Installer Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2012-1964
|
The certificate-warning functionality in browser/components/certerror/content/aboutCertError.xhtml in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.10 does not properly handle attempted clickjacking of the about:certerror page, which allows man-in-the-middle attackers to trick users into adding an unintended exception via an IFRAME element.
|
[
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-q8hg-956x-hjqc
|
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DAP-1360 with firmware 2.5.4 and earlier allow remote attackers to hijack the authentication of unspecified users for requests that change the (1) Enable Wireless, (2) MBSSID, (3) BSSID, (4) Hide Access Point, (5) SSID, (6) Country, (7) Channel, (8) Wireless mode, or (9) Max Associated Clients setting via a crafted request to index.cgi.
|
[] | null | null | null | null | null |
|
CVE-2023-37009
|
Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Notification` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.
|
[] | null | 6.3 | null | null | null |
|
GHSA-p52j-p77c-rqf9
|
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
[] | null | 7.2 | null | null | null |
|
CVE-2025-37783
|
drm/msm/dpu: Fix error pointers in dpu_plane_virtual_atomic_check
|
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Fix error pointers in dpu_plane_virtual_atomic_check
The function dpu_plane_virtual_atomic_check was dereferencing pointers
returned by drm_atomic_get_plane_state without checking for errors. This
could lead to undefined behavior if the function returns an error pointer.
This commit adds checks using IS_ERR to ensure that plane_state is
valid before dereferencing them.
Similar to commit da29abe71e16
("drm/amd/display: Fix error pointers in amdgpu_dm_crtc_mem_type_changed").
Patchwork: https://patchwork.freedesktop.org/patch/643132/
|
[] | null | null | null | null | null |
CVE-2020-23715
|
Directory Traversal vulnerability in Webport CMS 1.19.10.17121 via the file parameter to file/download.
|
[
"cpe:2.3:a:webport_cms_project:webport_cms:1.19.10.17121:*:*:*:*:*:*:*"
] | null | 8.6 | null | 5 | null |
|
GHSA-4282-645v-4hqh
|
Animation Manager in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Animation Manager Memory Corruption Vulnerability."
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-42261
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NOTE: the vendor's position is that authentication is intentionally not implemented because the product is not intended for an untrusted network environment. Use cases requiring authentication could, for example, use a reverse proxy server.
|
[
"cpe:2.3:a:opensecurity:mobile_security_framework:3.7.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2025-37768
|
drm/amd/pm: Prevent division by zero
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
|
[] | null | null | null | null | null |
CVE-2014-6342
|
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6348.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2007-5514
|
Multiple unspecified vulnerabilities in Oracle Database 10.2.0.3 have unknown impact and attack vectors related to (1) Database Vault component (DB24) and (2) SQL Execution component (DB26).
|
[
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2023-40518
|
LiteSpeed OpenLiteSpeed before 1.7.18 does not strictly validate HTTP request headers.
|
[
"cpe:2.3:a:litespeedtech:openlitespeed:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2013-6642
|
Google Chrome through 32.0.1700.23 on Android allows remote attackers to spoof the address bar via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1651.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1652.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1652.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1653.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1653.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1653.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1654.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1654.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1654.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1655.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1655.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1656.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1656.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1656.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1657.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1657.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1658.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1658.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1658.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1659.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1659.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1659.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1659.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1660.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1660.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1660.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1661.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1661.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1662.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1662.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1662.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1663.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1663.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1663.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1663.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1664.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1664.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1664.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1664.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1665.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1666.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1666.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1667.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1667.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1668.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1669.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1669.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1669.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1669.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1670.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1670.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1670.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1670.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1670.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1670.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1671.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1671.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1671.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1671.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1671.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1671.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1672.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1672.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1673.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1673.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1673.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1673.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1674.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1674.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1674.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1675.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1675.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1675.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1675.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1676.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1676.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1676.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1677.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1677.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1678.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1678.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1678.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1679.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1679.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1680.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1680.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1681.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1681.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1681.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1682.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1682.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1682.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1682.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1683.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1683.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1683.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1684.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1684.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1684.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1684.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1685.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1685.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1685.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1685.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1686.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1686.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1687.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1687.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1688.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1688.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1689.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1689.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1689.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1689.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1690.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1690.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:32.0.1700.22:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2009-0836
|
Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 1120 and 1301, does not require user confirmation before performing dangerous actions defined in a PDF file, which allows remote attackers to execute arbitrary programs and have unspecified other impact via a crafted file, as demonstrated by the "Open/Execute a file" action.
|
[
"cpe:2.3:a:foxitsoftware:reader:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:3.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-j9jq-pgcg-7c7v
|
Incorrect use of privileged API in UniversalCredentialManager prior to SMR Sep-2024 Release 1 allows local attackers to access privileged API related to UniversalCredentialManager.
|
[] | null | 6.2 | null | null | null |
|
GHSA-89xf-9vcr-5475
|
In FreeBSD 11.2-STABLE after r338618 and before r343786, 12.0-STABLE before r343781, and 12.0-RELEASE before 12.0-RELEASE-p3, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released potentially allowing a malicious local user to gain root privileges or escape from a jail.
|
[] | null | null | 8.8 | null | null |
|
CVE-2015-3784
|
Office Viewer in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:numbers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:keynote:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:pages:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:iwork:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2022:5757
|
Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds
|
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: random exponentials issue (Libraries, 8283875) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
|
[
"cpe:/a:redhat:openjdk:17::windows"
] | null | 7.5 | null | null | null |
CVE-2025-0864
|
Active Products Tables for WooCommerce. Use constructor to create tables <= 1.0.6.6 - Reflected Cross-Site Scripting
|
The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcodes_set' parameter in all versions up to, and including, 1.0.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
GHSA-2h8m-2p6j-5q33
|
Data Corruption in Intel Unite(R) Client before version 3.3.176.13 may allow an unauthenticated user to potentially cause a denial of service via network access.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-21188
|
Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-m6r5-3v8m-hpw6
|
The UserPro plugin through 4.9.23 for WordPress allows XSS via the shortcode parameter in a userpro_shortcode_template action to wp-admin/admin-ajax.php.
|
[] | null | null | 6.1 | null | null |
|
GHSA-3788-fmr6-h469
|
Integer signedness error in the DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later allows local users to read kernel memory or cause a denial of service (oops) via a negative optlen value.
|
[] | null | null | null | null | null |
|
ICSA-22-167-08
|
Siemens SICAM GridEdge
|
The affected software does not apply cross-origin resource sharing (CORS) restrictions for critical operations. In case an attacker tricks a legitimate user into accessing a special resource a malicious request could be executed. The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change data of an user, such as credentials, in case that user's id is known. The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions. The affected software discloses password hashes of other users upon request. This could allow an authenticated user to retrieve another users password hash.
|
[] | null | 4.9 | null | null | null |
GHSA-v6fv-j4r6-jh62
|
Directory traversal vulnerability in thumb.php in FlatNuke 2.5.3 allows remote attackers to read arbitrary images or obtain the installation path via the image parameter.
|
[] | null | null | null | null | null |
|
CVE-2014-8953
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Php Scriptlerim Who's Who script allow remote attackers to hijack the authentication of administrators or requests that (1) add an admin account via a request to filepath/yonetim/plugin/adminsave.php or have unspecified impact via a request to (2) ayarsave.php, (3) uyesave.php, (4) slaytadd.php, or (5) slaytsave.php.
|
[
"cpe:2.3:a:phpscriptlerim:php_scriptlerim_who\\'s_who:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-whp8-xgvp-xj3v
|
Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.
|
[] | null | 7.8 | null | null | null |
|
GHSA-hjpp-qfqw-hpvq
|
Insufficient protection of the inter-process communication functions in ABB System 800xA products OPC Server for AC 800M, MMS Server for AC 800M and Base Software for SoftControl (all published versions) enables an attacker authenticated on the local system to inject data, affecting the online view of runtime data shown in Control Builder.
|
[] | null | null | null | null | null |
|
GHSA-ppcc-8c3j-x247
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in clicklabs® Medienagentur Download Button for Elementor allows Stored XSS.This issue affects Download Button for Elementor: from n/a through 1.2.1.
|
[] | null | 6.5 | null | null | null |
|
GHSA-9qfv-2w67-mh77
|
An invalid memory address dereference was discovered in getString in util/decompile.c in libming 0.4.8 for CONSTANT16 data. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
|
[] | null | null | 6.5 | null | null |
|
GHSA-gjp8-77gc-r4rr
|
In the Linux kernel, the following vulnerability has been resolved:xhci: Fix Panther point NULL pointer deref at full-speed re-enumerationre-enumerating full-speed devices after a failed address device command
can trigger a NULL pointer dereference.Full-speed devices may need to reconfigure the endpoint 0 Max Packet Size
value during enumeration. Usb core calls usb_ep0_reinit() in this case,
which ends up calling xhci_configure_endpoint().On Panther point xHC the xhci_configure_endpoint() function will
additionally check and reserve bandwidth in software. Other hosts do
this in hardwareIf xHC address device command fails then a new xhci_virt_device structure
is allocated as part of re-enabling the slot, but the bandwidth table
pointers are not set up properly here.
This triggers the NULL pointer dereference the next time usb_ep0_reinit()
is called and xhci_configure_endpoint() tries to check and reserve
bandwidth[46710.713538] usb 3-1: new full-speed USB device number 5 using xhci_hcd
[46710.713699] usb 3-1: Device not responding to setup address.
[46710.917684] usb 3-1: Device not responding to setup address.
[46711.125536] usb 3-1: device not accepting address 5, error -71
[46711.125594] BUG: kernel NULL pointer dereference, address: 0000000000000008
[46711.125600] #PF: supervisor read access in kernel mode
[46711.125603] #PF: error_code(0x0000) - not-present page
[46711.125606] PGD 0 P4D 0
[46711.125610] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
[46711.125615] CPU: 1 PID: 25760 Comm: kworker/1:2 Not tainted 6.10.3_2 #1
[46711.125620] Hardware name: Gigabyte Technology Co., Ltd.
[46711.125623] Workqueue: usb_hub_wq hub_event [usbcore]
[46711.125668] RIP: 0010:xhci_reserve_bandwidth (drivers/usb/host/xhci.cFix this by making sure bandwidth table pointers are set up correctly
after a failed address device command, and additionally by avoiding
checking for bandwidth in cases like this where no actual endpoints are
added or removed, i.e. only context for default control endpoint 0 is
evaluated.
|
[] | null | 5.5 | null | null | null |
|
GHSA-8xmx-3p45-9gj4
|
ImageIO in Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .sgi file.
|
[] | null | null | null | null | null |
|
CVE-2021-38578
|
Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.
|
[
"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.5:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
|
CVE-2014-125116
|
HybridAuth 2.0.9 - 2.2.2 Unauthenticated RCE via install.php Configuration Injection
|
A remote code execution vulnerability exists in HybridAuth versions 2.0.9 through 2.2.2 due to insecure use of the install.php installation script. The script remains accessible after deployment and fails to sanitize input before writing to the application’s config.php file. An unauthenticated attacker can inject arbitrary PHP code into config.php, which is later executed when the file is loaded. This allows attackers to achieve remote code execution on the server. Exploitation of this issue will overwrite the existing configuration, rendering the application non-functional.
|
[] | 9.3 | null | null | null | null |
GHSA-wr4v-3f2h-6hhh
|
sonar-wrapper Command Injection vulnerability
|
A command injection vulnerability affects all versions of package sonar-wrapper. The injection point is located in lib/sonarRunner.js.
|
[] | null | 9.8 | null | null | null |
CVE-2004-2102
|
Cross-site scripting (XSS) vulnerability in FREESCO 2.05, a modified version of thttpd, allows remote attackers to inject arbitrary web script or HTML via the test parameter.
|
[
"cpe:2.3:a:freesco:freesco:2.05:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2014-1792
|
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1781, CVE-2014-1804, and CVE-2014-2770.
|
[
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-8cmq-frjc-cjc8
|
Missing Authorization vulnerability in WPEverest Everest Forms.This issue affects Everest Forms: from n/a through 2.0.3.
|
[] | null | 5.3 | null | null | null |
|
CVE-2023-39130
|
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c.
|
[
"cpe:2.3:a:gnu:gdb:-:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gdb:13.0.50.20220805-git:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2025-25674
|
Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid.
|
[] | null | 9.8 | null | null | null |
|
GHSA-r6hj-459q-h63h
|
ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.
|
[] | null | 8.8 | null | null | null |
|
GHSA-j7fm-r2v8-qx24
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Bruno "Aesqe" Babic File Gallery plugin <= 1.8.5.3 versions.
|
[] | null | 6.5 | null | null | null |
|
GHSA-fjwm-v9fm-fq7r
|
Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Trn Journal Domain). Supported versions that are affected are 14.5, 14.6 and 14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H).
|
[] | null | 6 | null | null | null |
|
GHSA-wfq4-f757-c65c
|
For ABB eSOMS versions 4.0 to 6.0.3, the X-Content-Type-Options Header is missing in the HTTP response, potentially causing the response body to be interpreted and displayed as different content type other than declared. A possible attack scenario would be unauthorized code execution via text interpreted as JavaScript.
|
[] | null | 6.1 | null | null | null |
|
GHSA-2v64-wgmh-whp9
|
BigFix Patch Download Plug-ins are affected by an insecure protocol support. The application can allow improper handling of SSL certificates validation.
|
[] | null | 2.8 | null | null | null |
|
CVE-2025-7490
|
PHPGurukul Vehicle Parking Management System reg-users.php sql injection
|
A vulnerability was found in PHPGurukul Vehicle Parking Management System 1.13. It has been classified as critical. Affected is an unknown function of the file /admin/reg-users.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2025-54442
|
Unrestricted Upload of File with Dangerous Type vulnerability in Samsung Electronics MagicINFO 9 Server allows Code Injection.This issue affects MagicINFO 9 Server: less than 21.1080.0.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-36189
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-56p3-cp47-6whc
|
SQL injection vulnerability in Random Prayer (ste_prayer) 0.0.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-6p5p-78mf-wwg6
|
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
|
[] | null | null | 9.1 | null | null |
|
GHSA-9mpj-7whj-6m8h
|
This issue was addressed through improved state management. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to use Siri to access sensitive user data.
|
[] | null | 4.6 | null | null | null |
|
CVE-2018-10812
|
The Bitpie application through 3.2.4 for Android and iOS uses cleartext storage for digital currency initial keys, which allows local users to steal currency by leveraging root access to read /com.biepie/shared_prefs/com.bitpie_preferences.xml (on Android) or a plist file in the app data folder (on iOS).
|
[
"cpe:2.3:a:bitpie:bitcoin_wallet:*:*:*:*:*:android:*:*",
"cpe:2.3:a:bitpie:bitcoin_wallet:*:*:*:*:*:iphone_os:*:*"
] | null | null | 4.1 | 1.9 | null |
|
GHSA-gfr5-jh8m-r2xx
|
Certain ASUS WiFi routers models has an OS Command Injection vulnerability, allowing an authenticated remote attacker to execute arbitrary system commands by sending a specially crafted request.
|
[] | null | 8.8 | null | null | null |
|
GHSA-3jmr-9gf9-2x42
|
Stack-based buffer overflow in the Word 97 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted Word 97 file that triggers memory corruption, related to use of inconsistent integer data sizes for an unspecified length field, aka "WordPad Word 97 Text Converter Stack Overflow Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-1999-0465
|
Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.
|
[] | null | null | null | 10 | null |
|
RHSA-2009:0020
|
Red Hat Security Advisory: bind security update
|
bind: DSA_do_verify() returns check issue
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2016-0993
|
Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-1010.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
ICSA-20-128-01
|
Advantech WebAccess Node
|
An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed.CVE-2020-12022 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application 's control.CVE-2020-12010 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H). Multiple relative path traversal vulnerabilities exist that may allow an attacker to overwrite files outside the application 's control.CVE-2020-12006 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application 's control.CVE-2020-12026 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). Input is not properly sanitized and may allow an attacker to inject SQL commands.CVE-2020-12014 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.CVE-2020-12002 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.CVE-2020-10638 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An out-of-bounds vulnerability exists that may allow access to unauthorized data.CVE-2020-12018 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.