Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-ghpp-p7j7-78gh
NETGEAR RAX40 devices before 1.0.3.64 are affected by disclosure of sensitive information.
[]
CVE-2000-0406
Netscape Communicator before version 4.73 and Navigator 4.07 do not properly validate SSL certificates, which allows remote attackers to steal information by redirecting traffic from a legitimate web server to their own malicious server, aka the "Acros-Suencksen SSL" vulnerability.
[ "cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.5_beta:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*" ]
CVE-2005-0712
Mac OS X before 10.3.8 users world-writable permissions for certain directories, which may allow local users to gain privileges, possibly via the receipt cache or ColorSync profiles.
[ "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*" ]
GHSA-5hf5-fh77-h2w2
The Responsive Gallery Grid WordPress plugin before 2.3.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
CVE-2020-24742
An issue has been fixed in Qt versions 5.14.0 where QPluginLoader attempts to load plugins relative to the working directory, allowing attackers to execute arbitrary code via crafted files.
[ "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*" ]
CVE-2014-1326
WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*" ]
GHSA-3wc6-3hc2-3wc8
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
[]
CVE-2008-4906
SQL injection vulnerability in lyrics_song.php in the Lyrics (lyrics_menu) plugin 0.42 for e107 allows remote attackers to execute arbitrary SQL commands via the l_id parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:w1n78:lyrics:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*" ]
CVE-2023-28709
Apache Tomcat: Fix for CVE-2023-24998 is incomplete
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
[ "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*" ]
GHSA-mq52-895v-f8xx
Cross-site scripting (XSS) vulnerability in asdoc/templates/index.html in Apache Flex before 4.14.1 allows remote attackers to inject arbitrary web script or HTML by providing a crafted URI to JavaScript code generated by the asdoc component.
[]
CVE-2021-27330
Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents.
[ "cpe:2.3:a:triconsole:datepicker_calendar:*:*:*:*:*:*:*:*" ]
CVE-2018-2704
Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Payments accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 8.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
[ "cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*" ]
GHSA-rfgc-5r25-fw46
Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter.
[]
GHSA-pqvr-487j-j8c4
In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
[]
GHSA-xqc9-pqh7-3h69
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.1.0.
[]
CVE-2017-7538
A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users.
[ "cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*" ]
CVE-2019-17042
An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
[ "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
CVE-2008-5884
AyeView 2.20 allows user-assisted attackers to cause a denial of service (application crash) via a GIF file with a malformed header.
[ "cpe:2.3:a:zkesoft:ayeview:2.20:*:*:*:*:*:*:*" ]
CVE-2019-1003002
A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
[ "cpe:2.3:a:jenkins:pipeline\\:_declarative:*:*:*:*:*:jenkins:*:*", "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*" ]
CVE-2024-28550
Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the filePath parameter of formExpandDlnaFile function.
[ "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*" ]
GHSA-23c8-gv7j-76hv
A Null Pointer Dereference vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks.
[]
CVE-2020-10069
Zephyr Bluetooth unchecked packet data results in denial of service
Zephyr Bluetooth unchecked packet data results in denial of service. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Parameters (CWE-233). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp
[ "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*" ]
CVE-2021-35202
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService.
[ "cpe:2.3:a:netscout:ngeniusone:6.3.0:*:*:*:*:*:*:*" ]
CVE-2024-44039
WordPress WP Travel – Ultimate Travel Booking System, Tour Management Engine plugin <= 9.3.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel allows Stored XSS.This issue affects WP Travel: from n/a through 9.3.1.
[]
GHSA-78w8-jw35-5rj7
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 does not properly implement the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for unintended HTTP traffic on port 8445.
[]
GHSA-cp9g-348x-3wqv
A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New Routes in RoutingConfiguration on " /routing.asp ".
[]
GHSA-cjw9-8435-h4q5
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
[]
GHSA-64mh-22cg-c7mf
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.
[]
GHSA-h5x9-4j34-4q7p
A maliciously crafted DWF file, when parsed in w3dtk.dll through Autodesk Navisworks, can force a Use-After-Free. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the context of the current process.
[]
CVE-2025-32679
WordPress User Registration Using Contact Form 7 plugin <= 2.2 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in ZealousWeb User Registration Using Contact Form 7 allows Cross Site Request Forgery. This issue affects User Registration Using Contact Form 7: from n/a through 2.2.
[]
CVE-2015-3149
The Hotspot component in OpenJDK8 as packaged in Red Hat Enterprise Linux 6 and 7 allows local users to write to arbitrary files via a symlink attack.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
GHSA-c37p-8677-9fjp
A code execution vulnerability exists in the Xiaomi Game center application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code.
[]
CVE-2016-5724
Cloudera CDH before 5.9 has Potentially Sensitive Information in Diagnostic Support Bundles.
[ "cpe:2.3:a:cloudera:cdh:*:*:*:*:*:*:*:*" ]
GHSA-w7qw-j374-vmgx
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
GHSA-wm68-vvjf-2rc3
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability.
[]
GHSA-r8rh-2mfh-6v8x
Multiple stored cross-site scripting (XSS) vulnerabilities in Arcadyan Wifi routers VRV9506JAC23 allow remote attackers to inject arbitrary web script or HTML via the hostName and domain_name parameters present in the LAN configuration section of the administrative dashboard.
[]
GHSA-349g-pr27-x5hf
DameWare Mini Remote Control 3.x before 3.74 and 4.x before 4.2 transmits the Blowfish encryption key in plaintext, which allows remote attackers to gain sensitive information.
[]
GHSA-fcvh-7h6p-x524
Lockbox in EMC Documentum D2 before 4.5 uses a hardcoded passphrase when a server lacks a D2.Lockbox file, which makes it easier for remote authenticated users to decrypt admin tickets by locating this passphrase in a decompiled D2 JAR archive.
[]
GHSA-8v36-8jq8-23wc
SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity, and availability of the application.
[]
GHSA-88rc-96xj-2mvh
In the Linux kernel, the following vulnerability has been resolved:dma-buf: heaps: Fix potential spectre v1 gadgetIt appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec.[sumits: added fixes and cc: stable tags]
[]
GHSA-xr3c-3fp9-4fcp
An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
[]
CVE-2023-53091
ext4: update s_journal_inum if it changes after journal replay
In the Linux kernel, the following vulnerability has been resolved: ext4: update s_journal_inum if it changes after journal replay When mounting a crafted ext4 image, s_journal_inum may change after journal replay, which is obviously unreasonable because we have successfully loaded and replayed the journal through the old s_journal_inum. And the new s_journal_inum bypasses some of the checks in ext4_get_journal(), which may trigger a null pointer dereference problem. So if s_journal_inum changes after the journal replay, we ignore the change, and rewrite the current journal_inum to the superblock.
[]
GHSA-x4w2-gh57-r677
In the Linux kernel, the following vulnerability has been resolved:bpf: Fix deadlock when freeing cgroup storageThe following commit bc235cdb423a ("bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]") first introduced deadlock prevention for fentry/fexit programs attaching on bpf_task_storage helpers. That commit also employed the logic in map free path in its v6 version.Later bpf_cgrp_storage was first introduced in c4bcfb38a95e ("bpf: Implement cgroup storage available to non-cgroup-attached bpf progs") which faces the same issue as bpf_task_storage, instead of its busy counter, NULL was passed to bpf_local_storage_map_free() which opened a window to cause deadlock:Progs:A: SEC("fentry/cgroup_storage_ptr")cgid (BPF_MAP_TYPE_HASH) Record the id of the cgroup the current task belonging to in this hash map, using the address of the cgroup as the map key.cgrpa (BPF_MAP_TYPE_CGRP_STORAGE) If current task is a kworker, lookup the above hash map using function parameter @owner as the key to get its corresponding cgroup id which is then used to get a trusted pointer to the cgroup through bpf_cgroup_from_id(). This trusted pointer can then be passed to bpf_cgrp_storage_get() to finally trigger the deadlock issue.B: SEC("tp_btf/sys_enter")cgrpb (BPF_MAP_TYPE_CGRP_STORAGE) The only purpose of this prog is to fill Prog A's hash map by calling bpf_cgrp_storage_get() for as many userspace tasks as possible.Steps to reproduce:Run A;while (true) { Run B; Destroy B; }Fix this issue by passing its busy counter to the free procedure so it can be properly incremented before storage/smap locking.
[]
GHSA-2q58-xp4p-xpqc
IBM Security Directory Server 6.4.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 228582.
[]
CVE-2023-41956
WordPress Simple Membership plugin <= 4.3.4 - Authenticated Account Takeover vulnerability
Improper Authentication vulnerability in smp7, wp.Insider Simple Membership.This issue affects Simple Membership: from n/a through 4.3.4.
[ "cpe:2.3:a:smp7_wpinsider:simple_membership:*:*:*:*:*:*:*:*" ]
CVE-2014-7740
The Pony Magazine (aka com.triactivemedia.ponymagazine) application @7F080193 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:pocketmags:pony_magazine:\\@7f080193:*:*:*:*:android:*:*" ]
GHSA-v2v7-v2fq-rjwr
Unknown vulnerability in Xerox MicroServer Web Server for various WorkCentre products including M35/M45/M55 2.028.11.000 through 2.97.20.032 and 4.84.16.000 through 4.97.20.032, Pro 35/45/55 3.028.11.000 through 3.97.20.032, Pro 65/75/90 1.001.00.060 through 1.001.02.084, and others, related to SNMP authentication, allows remote attackers to modify system configuration, a different vulnerability than CVE-2005-0703.
[]
GHSA-x723-g4p2-w8m5
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors.
[]
CVE-2023-44207
Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
[ "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2020-5944
In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration. F5 has done further review of this vulnerability and has re-classified it as a defect. CVE-2020-5944 will continue to be referenced in F5 Security Advisory K57274211 and will not be assigned to other F5 vulnerabilities.
[ "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*" ]
CVE-2000-1128
The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.
[ "cpe:2.3:a:mcafee:virusscan:4.5:*:*:*:*:*:*:*" ]
CVE-2019-10068
An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
[ "cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*" ]
GHSA-9cgf-pxwq-2cpw
Stimulsoft Dashboard.JS Cross Site Scripting vulnerability
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field.
[]
GHSA-9q4q-2xpr-pvwv
Cross-Site Request Forgery (CSRF) vulnerability in Paid Memberships Pro.This issue affects Paid Memberships Pro: from n/a through 2.12.10.
[]
CVE-2020-0684
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2017-2990
Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 decompression routine. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*" ]
CVE-2009-3431
Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*" ]
GHSA-pj2h-85jq-g5vg
Answer Missing Authentication for Critical Function
Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.
[]
CVE-2006-1890
Multiple PHP remote file inclusion vulnerabilities in myWebland myEvent 1.2 allow remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter in (1) event.php and (2) initialize.php. NOTE: vector 2 was later reported to affect 1.4 as well.
[ "cpe:2.3:a:mywebland:myevent:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:myevent:1.4:*:*:*:*:*:*:*" ]
CVE-2024-27733
File Upload vulnerability in Byzro Network Smart s42 Management Platform v.S42 allows a local attacker to execute arbitrary code via the useratte/userattestation.php component.
[ "cpe:2.3:a:byzronetwork:management_platform:s42:*:*:*:*:*:*:*" ]
CVE-2018-12034
In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can cause an out of bounds read vulnerability in yr_execute_code in libyara/exec.c.
[ "cpe:2.3:a:virustotal:yara:*:*:*:*:*:*:*:*" ]
GHSA-46x2-rxf4-75x5
In certain Secustation products the administrator account password can be read. This affects V2.5.5.3116-S50-SMA-B20171107A, V2.3.4.1301-M20-TSA-B20150617A, V2.5.5.3116-S50-RXA-B20180502A, V2.5.5.3116-S50-SMA-B20190723A, V2.5.5.3116-S50-SMB-B20161012A, V2.3.4.2103-S50-NTD-B20170508B, V2.5.5.3116-S50-SMB-B20160601A, V2.5.5.2601-S50-TSA-B20151229A, and V2.5.5.3116-S50-SMA-B20170217.
[]
CVE-2011-0457
Cross-site scripting (XSS) vulnerability in e107 0.7.22 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.21:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.547:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.548:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.549:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.551:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.552:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.553:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.554:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.555:beta:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*" ]
GHSA-w3hv-rp5r-hr2c
Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.
[]
GHSA-gmrq-4x3w-3rjh
Cross-site request forgery (CSRF) vulnerability in VaM Shop 1.6, 1.6.1, and probably earlier versions allows remote attackers to hijack the authentication of administrators for requests that (1) change user status via admin/customers.php or (2) change user permissions via admin/accounting.php. NOTE: some of these details are obtained from third party information.
[]
CVE-2024-7772
Jupiter X Core <= 4.6.5 - Unauthenticated Arbitrary File Upload
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the 'validate' function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
[ "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*" ]
GHSA-83p3-xf8j-2pxj
Cross Site Scripting vulnerability in TinyMCE v.4.9.6 and before and v.5.0.0 thru v.5.1.4 allows an attacker to execute arbitrary code via the editor function.
[]
GHSA-2xgx-58x8-9qqr
The issue was addressed with improved permissions logic. This issue is fixed in iOS 15 and iPadOS 15. An attacker with physical access to a device may be able to see private contact information.
[]
CVE-2006-2663
Multiple cross-site scripting (XSS) vulnerabilities in iFlance 1.1 allow remote attackers to inject arbitrary web script or HTML via certain inputs to (1) acc_verify.php or (2) project.php.
[ "cpe:2.3:a:ifusionservices:iflance:1.1:*:*:*:*:*:*:*" ]
GHSA-4r39-f4rh-j6q8
Missing permission check in Jenkins Gerrit Trigger Plugin
A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master.
[]
CVE-2014-125008
FFmpeg oggparsevorbis.c vorbis_header memory corruption
A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
[ "cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*" ]
GHSA-2m4c-5v2r-9p3g
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.
[]
CVE-2015-8642
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:20.0.0.228:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:20.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" ]
CVE-2025-0460
Blog Botz for Journal Theme blog_add unrestricted upload
A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-pqwr-phvv-v49f
Open WebUI Allows Admin Deletion via API Endpoint
In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint `http://0.0.0.0:8080/api/v1/users/{uuid_administrator}`. This action is restricted by the user interface but can be performed through direct API calls.
[]
GHSA-h4f2-63f6-jv7q
The Virtual Token driver (vdlptokn.sys) 1.0.2.43 in DESlock+ 3.2.7 allows local users to cause a denial of service (system crash) via a crafted IOCTL request to \Device\DLPTokenWalter0.
[]
GHSA-pww6-pfx4-8p5c
A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. The vulnerability exists because the application fails to handle a crafted DWG file, which causes an unhandled exception. An attacker can leverage this vulnerability to execute arbitrary code.
[]
CVE-2011-5137
Multiple SQL injection vulnerabilities in tForum b0.915 allow remote attackers to execute arbitrary SQL commands via the (1) TopicID parameter to viewtopic.php, the (2) BoardID parameter to viewboard.php, or (3) CatID parameter to viewcat.php.
[ "cpe:2.3:a:tforum:tforum:b0.915:*:*:*:*:*:*:*" ]
CVE-2022-32129
74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/account/safety/trade.
[ "cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*" ]
GHSA-8vrr-cjgj-wp73
Cowbell 0.2.7.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
[]
CVE-2020-5233
Open Redirect in OAuth2 Proxy
OAuth2 Proxy before 5.0 has an open redirect vulnerability. Authentication tokens could be silently harvested by an attacker. This has been patched in version 5.0.
[ "cpe:2.3:a:oauth2_proxy_project:oauth2_proxy:*:*:*:*:*:*:*:*" ]
GHSA-qrqf-2crr-jvqf
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a bz3_decode_block out-of-bounds read.
[]
GHSA-g5xw-fr6p-pc5j
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AWSM Innovations AWSM Team allows Path Traversal.This issue affects AWSM Team: from n/a through 1.3.1.
[]
GHSA-g4gq-j4p2-j8fr
Remote Code Execution via Script (Python) objects under Python 3
ImpactBackground: The optional add-on package `Products.PythonScripts` adds `Script (Python)` to the list of content items a user can add to the Zope object database. Inside these scripts users can write Python code that is executed when rendered through the web. The code environment in these script objects is limited, it relies on the `RestrictedPython` package to provide a "safe" subset of Python instructions as well as the `AccessControl` package that defines security policies for execution in the context of a Zope application.Recently the `AccessControl` package was updated to fix a remote code execution security issue. A link to the security advisory is provided in the References section below. The bug tightens the `AccessControl` security policies for Zope by blocking access to unsafe classes inside the Python `string` module.You are only affected if the following are true:You use Python 3 for your Zope deployment (Zope 4 on Python 2 is not affected)You run Zope 4 below version 4.6.3 or Zope 5 below version 5.3You have installed the optional `Products.PythonScripts` add-on packageBy default, you need to have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk.PatchesThe problem has been fixed in `AccessControl` versions 4.3 and 5.2. Zope releases 4.6.3 and 5.3 now require these new `AccessControl` releases.WorkaroundsA site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.References[AccessControl security advisory GHSA-qcx9-j53g-ccgf](https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf)For more informationIf you have any questions or comments about this advisory:Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues)Email us at [[email protected]](mailto:[email protected])
[]
CVE-2010-3996
festival_server in Centre for Speech Technology Research (CSTR) Festival, probably 2.0.95-beta and earlier, places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
[ "cpe:2.3:a:cstr:festival:*:beta:*:*:*:*:*:*", "cpe:2.3:a:cstr:festival:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cstr:festival:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cstr:festival:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cstr:festival:1.95:*:*:*:*:*:*:*", "cpe:2.3:a:cstr:festival:1.96:*:*:*:*:*:*:*" ]
CVE-2006-1786
Cross-site scripting (XSS) vulnerability in Adobe Document Server for Reader Extensions 6.0 allows remote attackers to inject arbitrary web script or HTML via (1) the actionID parameter in ads-readerext and (2) the op parameter in AlterCast. NOTE: it is not clear whether the vendor advisory addresses this issue.
[ "cpe:2.3:a:adobe:document_server:6.0:*:reader_extensions:*:*:*:*:*" ]
GHSA-79mg-j8gj-jwc2
Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to memory exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system. Malicious code cannot be injected.
[]
CVE-2021-27343
SerenityOS Unspecified is affected by: Buffer Overflow. The impact is: obtain sensitive information (context-dependent). The component is: /Userland/Libraries/LibCrypto/ASN1/DER.h Crypto::der_decode_sequence() function. The attack vector is: Parsing RSA Key ASN.1.
[ "cpe:2.3:o:serenityos:serenityos:-:*:*:*:*:*:*:*" ]
CVE-2023-36645
SQL injection vulnerability in ITB-GmbH TradePro v9.5, allows remote attackers to run SQL queries via oordershow component in customer function.
[ "cpe:2.3:a:itb_gmbh:tradepro:9.5:*:*:*:*:*:*:*" ]
GHSA-fhxg-444p-h63x
Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
[]
CVE-2025-24117
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user.
[]
CVE-2015-8787
The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2020-8322
A potential vulnerability in the SMI callback function used in the Legacy USB driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution.
[ "cpe:2.3:o:lenovo:330-14ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:330-14ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:330-15ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:330-15ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:330-17ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:330-17ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:340c-15api_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:340c-15api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:340c-15ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:340c-15ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:720s_touch-15ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:720s_touch-15ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:720s-15ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:720s-15ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:730s-13iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:730s-13iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:c640-iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:c640-iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:e42-80_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:e42-80:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:e52-80_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:e52-80:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:k22-80_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:k22-80:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v720-12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v720-12:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:k32-80_kbl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:k32-80_kbl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:k32-80_skl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:k32-80_skl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:miix_720-12ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:miix_720-12ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-14api_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-14api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-14ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-14ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-15api_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-15api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-15ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-15ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s540-13api_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s540-13api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s750-iil_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s750-iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s940-14iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s940-14iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_13s-iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_13s-iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_14s-iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_14s-iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v110-14ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v110-14ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v110-14ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v110-14ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v110-15ast_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v110-15ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v130-15igm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v130-15igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v130-15ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v130-15ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v310-15igm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v310-15igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v330-15igm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v330-15igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v330-15ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v330-15ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v330-15isk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v330-15isk:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v340-iil_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v340-iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v340-iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v340-iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v540s-13_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v540s-13:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:14iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:14iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v730-13ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v730-13ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v730-13isk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v730-13isk:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v730-15ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v730-15ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:wei5-15ikb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:wei5-15ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:xiaoxin_14-ast_qc_2019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:xiaoxin_14-ast_qc_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:xx-14api_qc_2019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:xx-14api_qc_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_s730-13iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_s730-13iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_s940-14iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_s940-14iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:6_pro-13-iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:6_pro-13-iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:6_pro-14-iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:6_pro-14-iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:e53-80_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:e53-80:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:k3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:k3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:k4-iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:k4-iwl:-:*:*:*:*:*:*:*" ]
GHSA-hqgq-3r9h-h993
ENC DataVault 7.1.1W uses an inappropriate encryption algorithm, such that an attacker (who does not know the secret key) can make ciphertext modifications that are reflected in modified plaintext. There is no data integrity mechanism. (This behavior occurs across USB drives sold under multiple brand names.)
[]
CVE-2017-3319
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 3.1 (Confidentiality impacts).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
CVE-2023-44037
An issue in ZPE Systems, Inc Nodegrid OS v.5.8.10 thru v.5.8.13 and v.5.10.3 thru v.5.10.5 allows a remote attacker to obtain sensitive information via the TACACS+ server component.
[ "cpe:2.3:o:zpesystems:nodegrid_os:*:*:*:*:*:*:*:*" ]
GHSA-jj38-pjm7-xq96
Multiple cross-site scripting (XSS) vulnerabilities in synetics i-doit open 0.9.9-7, i-doit pro 1.0 and earlier, and i-doit pro 1.0.2 when the 'sanitize user input' flag is not enabled, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
[ "cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:jbig2dec:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2022-48940
bpf: Fix crash due to incorrect copy_map_value
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix crash due to incorrect copy_map_value When both bpf_spin_lock and bpf_timer are present in a BPF map value, copy_map_value needs to skirt both objects when copying a value into and out of the map. However, the current code does not set both s_off and t_off in copy_map_value, which leads to a crash when e.g. bpf_spin_lock is placed in map value with bpf_timer, as bpf_map_update_elem call will be able to overwrite the other timer object. When the issue is not fixed, an overwriting can produce the following splat: [root@(none) bpf]# ./test_progs -t timer_crash [ 15.930339] bpf_testmod: loading out-of-tree module taints kernel. [ 16.037849] ================================================================== [ 16.038458] BUG: KASAN: user-memory-access in __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.038944] Write of size 8 at addr 0000000000043ec0 by task test_progs/325 [ 16.039399] [ 16.039514] CPU: 0 PID: 325 Comm: test_progs Tainted: G OE 5.16.0+ #278 [ 16.039983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0-1 04/01/2014 [ 16.040485] Call Trace: [ 16.040645] <TASK> [ 16.040805] dump_stack_lvl+0x59/0x73 [ 16.041069] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.041427] kasan_report.cold+0x116/0x11b [ 16.041673] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.042040] __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.042328] ? memcpy+0x39/0x60 [ 16.042552] ? pv_hash+0xd0/0xd0 [ 16.042785] ? lockdep_hardirqs_off+0x95/0xd0 [ 16.043079] __bpf_spin_lock_irqsave+0xdf/0xf0 [ 16.043366] ? bpf_get_current_comm+0x50/0x50 [ 16.043608] ? jhash+0x11a/0x270 [ 16.043848] bpf_timer_cancel+0x34/0xe0 [ 16.044119] bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81 [ 16.044500] bpf_trampoline_6442477838_0+0x36/0x1000 [ 16.044836] __x64_sys_nanosleep+0x5/0x140 [ 16.045119] do_syscall_64+0x59/0x80 [ 16.045377] ? lock_is_held_type+0xe4/0x140 [ 16.045670] ? irqentry_exit_to_user_mode+0xa/0x40 [ 16.046001] ? mark_held_locks+0x24/0x90 [ 16.046287] ? asm_exc_page_fault+0x1e/0x30 [ 16.046569] ? asm_exc_page_fault+0x8/0x30 [ 16.046851] ? lockdep_hardirqs_on+0x7e/0x100 [ 16.047137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 16.047405] RIP: 0033:0x7f9e4831718d [ 16.047602] Code: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48 [ 16.048764] RSP: 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023 [ 16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d [ 16.049747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0 [ 16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0 [ 16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30 [ 16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 16.051608] </TASK> [ 16.051762] ==================================================================
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2007-4295
Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80749.
[ "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*" ]