id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2021-36073 | Adobe Bridge SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Adobe Bridge version 11.1 (and earlier) is affected by a heap-based buffer overflow vulnerability when parsing a crafted .SGI file. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
CVE-2005-4840 | The Outlook Express Address Book control, when using Internet Explorer 6, allows remote attackers to cause a denial of service (NULL dereference and browser crash) by creating the OutlookExpress.AddressBook COM object, which is not intended for use within Internet Explorer. | [
"cpe:2.3:a:microsoft:outlook_express_book_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*"
]
|
|
GHSA-w7rg-gwm8-fqcm | Multiple cross-site scripting (XSS) vulnerabilities in the Calendar module in Olat 7.8.0.1 (b20130821 N1) allow remote attackers to inject arbitrary web script or HTML via the (1) event name or (2) date field. | []
|
|
GHSA-3r5r-ff5q-4gx4 | Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | []
|
|
GHSA-46gv-fchp-9624 | ACRN before 2.5 has a hw/pci/virtio/virtio.c vq_endchains NULL Pointer Dereference. | []
|
|
GHSA-2rcj-jvwv-8rhr | Cross-Site Request Forgery (CSRF) vulnerability in RegistrationMagic plugin <= 5.1.9.2 versions. | []
|
|
CVE-2008-7062 | Unrestricted file upload vulnerability in admin/index.php in Download Manager module 1.0 for LoveCMS 1.6.2 Final allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in uploads/. | [
"cpe:2.3:a:lovecms:lovecms:1.6.2:*:*:*:*:*:*:*"
]
|
|
CVE-2022-32799 | An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. A user in a privileged network position may be able to leak sensitive information. | [
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*"
]
|
|
CVE-2016-0331 | Cross-site scripting (XSS) vulnerability in IBM Rational Team Concert 6.0.1 and 6.0.2 before 6.0.2 iFix2 and Rational Collaborative Lifecycle Management 6.0.1 and 6.0.2 before 6.0.2 iFix2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*"
]
|
|
CVE-2024-12155 | SV100 Companion <= 2.0.02 - Missing Authorization to Unuathenticated Arbitrary Options Update | The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [
"cpe:2.3:a:straightvisions:sv100_companion:*:*:*:*:*:*:*:*"
]
|
CVE-2013-2565 | A vulnerability in Mambo CMS v4.6.5 where the scripts thumbs.php, editorFrame.php, editor.php, images.php, manager.php discloses the root path of the webserver. | [
"cpe:2.3:a:mambo-foundation:mambo_cms:4.6.5:*:*:*:*:*:*:*"
]
|
|
CVE-2022-39840 | Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a direct message (DM). | [
"cpe:2.3:a:cotonti:cotonti_siena:0.9.20:*:*:*:*:*:*:*"
]
|
|
CVE-2006-1087 | Direct static code injection vulnerability in the modify_config action in admin.php for PHP-Stats 0.1.9.1 and earlier allows remote authenticated administrators to execute arbitrary PHP code via the option_new[compatibility_mode] parameter, which is not filtered before being stored in config.php. NOTE: this vulnerability can be exploited by remote unauthenticated attackers in conjunction with the option[admin_pass] authentication bypass vulnerability. | [
"cpe:2.3:a:php-stats:php-stats:*:*:*:*:*:*:*:*"
]
|
|
GHSA-gp95-ppv5-3jc5 | sharp vulnerable to Command Injection in post-installation over build environment | There's a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5.This is not part of any runtime code, does not affect Windows users at all, and is unlikely to affect anyone that already cares about the security of their build environment. However, out of an abundance of caution, I've created this advisory.If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` environment variable in a build environment then they might be able to use this to inject an arbitrary command at `npm install` time.I've used the Common Vulnerability Scoring System (CVSS) calculator to determine the maximum possible impact, which suggests a "medium" score of 5.9, but for most people the real impact will be dealing with the noise from automated security tooling that this advisory will bring.[`AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:R/MS:X/MC:X/MI:X/MA:X`](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:R/MS:X/MC:X/MI:X/MA:X&version=3.1)This problem was fixed in commit a6aeef6 and published as part of `sharp` v0.30.5.Thank you very much to @dwisiswant0 for the responsible disclosure.Remember: if an attacker has control over environment variables in your build environment then you have a bigger problem to deal with than this issue. | []
|
GHSA-h6cc-4vmm-cxpp | The Popup Maker – Popup for opt-ins, lead gen, & more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.18.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
|
GHSA-f52v-43r8-5wwj | Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.19 and earlier, 7.3.8 and earlier and 7.4.5 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts). | []
|
|
CVE-2013-2817 | An ActiveX control in IcoLaunch.dll in Mitsubishi Electric Automation MC-WorX Suite 8.02 allows user-assisted remote attackers to execute arbitrary programs via a crafted HTML document in conjunction with a Login Client button click. | [
"cpe:2.3:a:mitsubishielectric:mc-worx_suite:*:*:*:*:*:*:*:*"
]
|
|
GHSA-mp8x-xfvp-m4vh | A vulnerability was found in Netis WF-2404 1.1.124EN. It has been rated as problematic. This issue affects some unknown processing of the file /еtc/passwd. The manipulation leads to use of weak hash. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
|
|
CVE-2022-25098 | ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter. | [
"cpe:2.3:a:ectouch:ectouch:2.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-27849 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15. An app may be able to read sensitive location information. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
|
|
CVE-2023-21643 | Untrusted Pointer Dereference in Automotive | Memory corruption due to untrusted pointer dereference in automotive during system call. | [
"cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*"
]
|
GHSA-f532-g5cf-vhjp | Directory Traversal vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server Dashboard allows Path Traversal. This affects versions from 1.5.11 through 1.5.12, from 1.6.5 through 1.6.20.1, from 1.7.0 before 1.7.16.1 | []
|
|
GHSA-372f-mphc-35vc | In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2058. | []
|
|
CVE-2020-3393 | Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability | A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability. | [
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-12x48ur:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-12x48uz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24pdm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24ps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24td:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24ts:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fqm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48ps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48td:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48ts:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-8x24uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-12s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-12x48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-12xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24xu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48xs:-:*:*:*:*:*:*:*"
]
|
GHSA-mx42-hfvg-9v66 | Unspecified vulnerability in the H.323 implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 2.5.x before 2.5.2 and 2.6.x before 2.6.1, allows remote attackers to cause a denial of service (device reload) via crafted H.323 packets, aka Bug ID CSCtc73759. | []
|
|
CVE-2021-20084 | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-sparkle 1.5.2-beta allows a malicious user to inject properties into Object.prototype. | [
"cpe:2.3:a:jquery-sparkle_project:jquery-sparkle:1.5.2:beta:*:*:*:*:*:*"
]
|
|
GHSA-4xh9-c7jc-9fc5 | A stack-based buffer overflow can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) 5.4.0.1031 when parsing the URI string. An attacker can leverage this to gain remote code execution. | []
|
|
GHSA-xg5w-j24m-8379 | DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily. This issue affects * FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; * UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C. List of CPEs: * cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:* | []
|
|
GHSA-5w2f-hr95-2h6j | In the Linux kernel, the following vulnerability has been resolved:nexthop: Fix division by zero while replacing a resilient groupThe resilient nexthop group torture tests in fib_nexthop.sh exposed a
possible division by zero while replacing a resilient group [1]. The
division by zero occurs when the data path sees a resilient nexthop
group with zero buckets.The tests replace a resilient nexthop group in a loop while traffic is
forwarded through it. The tests do not specify the number of buckets
while performing the replacement, resulting in the kernel allocating a
stub resilient table (i.e, 'struct nh_res_table') with zero buckets.This table should never be visible to the data path, but the old nexthop
group (i.e., 'oldg') might still be used by the data path when the stub
table is assigned to it.Fix this by only assigning the stub table to the old nexthop group after
making sure the group is no longer used by the data path.Tested with fib_nexthops.sh:Tests passed: 222
Tests failed: 0[1]
divide error: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
RIP: 0010:nexthop_select_path+0x2d2/0x1a80
[...]
Call Trace:
fib_select_multipath+0x79b/0x1530
fib_select_path+0x8fb/0x1c10
ip_route_output_key_hash_rcu+0x1198/0x2da0
ip_route_output_key_hash+0x190/0x340
ip_route_output_flow+0x21/0x120
raw_sendmsg+0x91d/0x2e10
inet_sendmsg+0x9e/0xe0
__sys_sendto+0x23d/0x360
__x64_sys_sendto+0xe1/0x1b0
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xae | []
|
|
GHSA-jx6p-9c26-g373 | Oxidized Web RANCID migration page allows unauthenticated user to gain control over Linux user account | In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web. | []
|
GHSA-rwc8-699j-7phx | An issue was discovered in JTBC(PHP) 3.0.1.6. Arbitrary file deletion is possible via a /console/file/manage.php?type=action&action=delete&path=c%3A%2F substring. | []
|
|
GHSA-h4m3-84wr-c7xg | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass. | []
|
|
GHSA-x5p7-94xv-mc87 | A crafted binder request can cause an arbitrary unmap in MediaServer in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel. | []
|
|
GHSA-3p2m-vxm4-c34h | BarnOwl before 1.6.2 does not check the return code of calls to the (1) ZPending and (2) ZReceiveNotice functions in libzephyr, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. | []
|
|
GHSA-hwr4-fpqc-f4wf | A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code. | []
|
|
GHSA-436j-fff5-mq27 | Directory traversal vulnerability in index.php in Php Photo Album (PHPPA) 0.8 BETA allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the preview parameter. | []
|
|
GHSA-2px8-v868-2g2q | In the Linux kernel, the following vulnerability has been resolved:scsi: mpi3mr: Bad drive in topology results kernel crashWhen the SAS Transport Layer support is enabled and a device exposed to
the OS by the driver fails INQUIRY commands, the driver frees up the memory
allocated for an internal HBA port data structure. However, in some places,
the reference to the freed memory is not cleared. When the firmware sends
the Device Info change event for the same device again, the freed memory is
accessed and that leads to memory corruption and OS crash. | []
|
|
CVE-2021-33752 | Windows DNS Snap-in Remote Code Execution Vulnerability | Windows DNS Snap-in Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19003:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19003:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25661:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25661:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20069:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20069:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20069:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25661:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20069:*:*:*:*:*:x64:*"
]
|
GHSA-rrh5-w572-52vf | Cross-site scripting (XSS) vulnerability in article.php module for phpWebSite 0.8.3 allows remote attackers to execute arbitrary Javascript script via the sid parameter, as demonstrated using an IMG tag. | []
|
|
GHSA-f454-93xr-8w34 | Video Driver in Apple iOS before 7.1 and Apple TV before 6.1 allows remote attackers to cause a denial of service (NULL pointer dereference and device hang) via a crafted video file with MPEG-4 encoding. | []
|
|
CVE-2025-6765 | Intelbras InControl HTTP PUT Request operador permission | A vulnerability, which was classified as critical, has been found in Intelbras InControl 2.21.60.9. This issue affects some unknown processing of the file /v1/operador/ of the component HTTP PUT Request Handler. The manipulation leads to permission issues. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
|
GHSA-6php-vp5g-vw29 | cPanel before 11.54.0.4 allows certain file-read operations in bin/setup_global_spam_filter.pl (SEC-74). | []
|
|
GHSA-9gfh-wppm-mm59 | A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL. | []
|
|
GHSA-9xwg-3mgc-2p39 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
|
|
CVE-2010-2307 | Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request. | [
"cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:*"
]
|
|
CVE-2010-4499 | Session fixation vulnerability in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allows remote attackers to hijack web sessions via unspecified vectors. | [
"cpe:2.3:a:tibco:activecatalog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:collaborative_information_manager:*:*:*:*:*:*:*:*"
]
|
|
GHSA-f2wh-7rgj-4wmw | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). Affected devices do not properly handle malformed HTTP packets. This could allow an unauthenticated remote attacker to send a malformed HTTP packet causing certain functions to fail in a controlled manner. | []
|
|
GHSA-9gxv-jh66-5544 | Cross-site scripting (XSS) vulnerability in the FTP view feature in Mozilla 1.0 allows remote attackers to inject arbitrary web script or HTML via the title tag of an ftp URL. | []
|
|
CVE-2016-8698 | Heap-based buffer overflow in the bm_readbody_bmp function in bitmap_io.c in potrace before 1.13 allows remote attackers to have unspecified impact via a crafted BMP image, a different vulnerability than CVE-2016-8699, CVE-2016-8700, CVE-2016-8701, CVE-2016-8702, and CVE-2016-8703. | [
"cpe:2.3:a:potrace_project:potrace:*:*:*:*:*:*:*:*"
]
|
|
CVE-2013-4033 | IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority. | [
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:*:*:*:*"
]
|
|
GHSA-3wf7-83q3-948c | Remote code execution in alextselegidis/easyappointments | Cross Site Scripting vulnerability in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to execute arbitrary code via the legal_settings parameter. | []
|
CVE-2024-23513 | WordPress PropertyHive Plugin <= 2.0.5 is vulnerable to PHP Object Injection | Deserialization of Untrusted Data vulnerability in PropertyHive.This issue affects PropertyHive: from n/a through 2.0.5.
| [
"cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*"
]
|
GHSA-h3r9-rg3q-7f5f | An issue has been discovered in GitLab affecting all versions starting from 10.0 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to edit labels description by an unauthorised user. | []
|
|
CVE-2015-8010 | Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi. | [
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*"
]
|
|
GHSA-xxc2-9vrh-pfjm | A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.This vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.
Note: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information. | []
|
|
CVE-2010-4879 | PHP remote file inclusion vulnerability in dompdf.php in dompdf 0.6.0 beta1 allows remote attackers to execute arbitrary PHP code via a URL in the input_file parameter. | [
"cpe:2.3:a:digitaljunkies:dompdf:0.6.0:beta1:*:*:*:*:*:*"
]
|
|
CVE-2007-1378 | The ovrimos_longreadlen function in the Ovrimos extension for PHP before 4.4.5 allows context-dependent attackers to write to arbitrary memory locations via the result_id and length arguments. | [
"cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*"
]
|
|
GHSA-wcq8-87g7-jxwc | SQL injection vulnerability in forensics/base_qry_main.php in AlienVault Open Source Security Information Management (OSSIM) 3.1 allows remote authenticated users to execute arbitrary SQL commands via the time[0][0] parameter. | []
|
|
GHSA-vc6m-hm49-g9qg | phi4mm: Quadratic Time Complexity in Input Token Processing leads to denial of service | SummaryA critical performance vulnerability has been identified in the input preprocessing logic of the multimodal tokenizer. The code dynamically replaces placeholder tokens (e.g., <|audio_*|>, <|image_*|>) with repeated tokens based on precomputed lengths. Due to inefficient list concatenation operations, the algorithm exhibits quadratic time complexity (O(n²)), allowing malicious actors to trigger resource exhaustion via specially crafted inputs.DetailsAffected Component: input_processor_for_phi4mm function.
https://github.com/vllm-project/vllm/blob/8cac35ba435906fb7eb07e44fe1a8c26e8744f4e/vllm/model_executor/models/phi4mm.py#L1182-L1197The code modifies the input_ids list in-place using input_ids = input_ids[:i] + tokens + input_ids[i+1:]. Each concatenation operation copies the entire list, leading to O(n) operations per replacement. For k placeholders expanding to m tokens, total time becomes O(kmn), approximating O(n²) in worst-case scenarios.PoCTest data demonstrates exponential time growth:Doubling input size increases runtime by ~4x (consistent with O(n²)).ImpactDenial-of-Service (DoS): An attacker could submit inputs with many placeholders (e.g., 10,000 <|audio_1|> tokens), causing CPU/memory exhaustion.
Example: 10,000 placeholders → ~100 million operations.Remediation RecommendationsPrecompute all placeholder positions and expansion lengths upfront.
Replace dynamic list concatenation with a single preallocated array. | []
|
GHSA-vjmr-wrvf-m733 | Multiple cross-site scripting (XSS) vulnerabilities in PHPWebGallery 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) cat, (2) num, and (3) search parameters to (a) category.php, and the (4) slideshow, (5) show_metadata, and (6) start parameters to (b) picture.php, a different vulnerability than CVE-2006-1674. | []
|
|
CVE-2017-5002 | EMC RSA Archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is affected by an open redirect vulnerability. A remote unprivileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the RSA Archer application without the victims realizing an attack occurred. | [
"cpe:2.3:a:emc:rsa_archer_egrc:5.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.3.1:*:*:*:*:*:*:*"
]
|
|
GHSA-gmh7-75f4-578m | Vulnerability in Novell Open Enterprise Server (OES2015 SP1 before Scheduled Maintenance Update 10992, OES2015 before Scheduled Maintenance Update 10990, OES11 SP3 before Scheduled Maintenance Update 10991, OES11 SP2 before Scheduled Maintenance Update 10989) might allow authenticated remote attackers to perform unauthorized file access and modification. | []
|
|
CVE-2018-13198 | The sell function of a smart contract implementation for STeX Exchange ICO (STE), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. | [
"cpe:2.3:a:stex_exchange_ico_project:stex_exchange_ico:-:*:*:*:*:*:*:*"
]
|
|
GHSA-cpxg-5m58-xm8c | A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | []
|
|
CVE-2023-7008 | Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes | A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records. | [
"cpe:2.3:a:systemd_project:systemd:25:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:cryostat:2"
]
|
GHSA-q7rh-4p79-pmmf | A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability. | []
|
|
CVE-2023-40133 | In multiple locations of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
GHSA-pvw6-76ww-4x7m | Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage." | []
|
|
CVE-2018-11696 | An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Inspect::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. | [
"cpe:2.3:a:sass-lang:libsass:*:*:*:*:*:*:*:*"
]
|
|
CVE-2009-0680 | cgi-bin/welcome/VPN_only in the web interface in Netgear SSL312 allows remote attackers to cause a denial of service (device crash) via a crafted query string, as demonstrated using directory traversal sequences. | [
"cpe:2.3:h:netgear:ssl312:-:*:*:*:*:*:*:*"
]
|
|
GHSA-vwhc-xx59-6jfx | Insufficient output sanitization in TCExam 14.2.2 allows a remote, authenticated attacker to conduct persistent cross-site scripting (XSS) attacks by creating a crafted test. | []
|
|
CVE-2022-41262 | Due to insufficient input validation, SAP NetWeaver AS Java (HTTP Provider Service) - version 7.50, allows an unauthenticated attacker to inject a script into a web request header. On successful exploitation, an attacker can view or modify information causing a limited impact on the confidentiality and integrity of the application.
| [
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
]
|
|
CVE-2018-7633 | Code injection in the /ui/login form Language parameter in Epicentro E_7.3.2+ allows attackers to execute JavaScript code by making a user issue a manipulated POST request. | [
"cpe:2.3:o:adbglobal:epicentro:7.3.2:*:*:*:*:*:*:*"
]
|
|
GHSA-f6mg-hmfp-6grw | Stored XSS vulnerability in Coverage/Complexity Scatter Plot Plugin | Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. | []
|
CVE-2021-27019 | PuppetDB logging included potentially sensitive system information. | [
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppetdb:*:*:*:*:*:*:*:*"
]
|
|
GHSA-gjjm-7g3m-h4m5 | Logsign Unified SecOps Platform Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24165. | []
|
|
GHSA-hh82-4m3r-6hhj | internal/app/ChooserActivity.java in the ChooserTarget service in Android 6.x before 2016-07-01 mishandles target security checks, which allows attackers to gain privileges via a crafted application, aka internal bug 28384423. | []
|
|
CVE-2008-1673 | The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding. | [
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"
]
|
|
GHSA-q2gc-gg3x-7942 | Symfony XML Entity Expansion security vulnerability | Symfony 2.0.11 carried a [similar] XXE security fix, however, on review of ZF2 I also noted a vulnerability to XML Entity Expansion (XEE) attacks whereby all extensions making use of libxml2 have no defense against XEE Quadratic Blowup Attacks. The vulnerability is a function of there being no current method of disabling custom entities in PHP (i.e. defined internal to the XML document without using external entities). In a QBA, a long entity can be defined and then referred to multiple times in document elements, creating a memory sink with which Denial Of Service attacks against a host's RAM can be mounted. The use of the LIBXML_NOENT or equivalent option in a dependent extension amplified the impact (it doesn't actually mean "No Entities"). In addition, libxml2's innate defense against the related Exponential or Billion Laugh's XEE attacks is active only so long as the LIBXML_PARSEHUGE is NOT set (it disables libxml2's hardcoded entity recursion limit). No instances of these two options were noted, but it's worth referencing for the future.Consider this (non-fatal) example:<data>&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;&a;</data>
Increase the length of entity, and entity count to a few hundred, and peak memory usage will waste no time spiking the moment the nodeValue for is accessed since the entities will then be expanded by a simple multiplier effect. No external entities required....This can be used in combination with the usual XXE defense of calling libxml_disable_entity_loader(TRUE) and, optionally, the LIBXML_NONET option (should local filesystem access be allowable). The DOCTYPE may be removed instead of rejecting the XML outright but this would likely result in other problems with the unresolved entities. | []
|
GHSA-95gh-f9p8-hgvj | An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows DLL hijacking, aka CNVD-C-2021-68000 and CNVD-C-2021-68502. | []
|
|
GHSA-hm2r-m89c-6rgm | In Ubuntu's trust-store, if a user revokes location access from an application, the location is still available to the application because the application will honour incorrect, cached permissions. This is because the cache was not ordered by creation time by the Select struct in src/core/trust/impl/sqlite3/store.cpp. Fixed in trust-store (Ubuntu) version 1.1.0+15.04.20150123-0ubuntu1 and trust-store (Ubuntu RTM) version 1.1.0+15.04.20150123~rtm-0ubuntu1. | []
|
|
GHSA-7x9v-xjqv-hpfr | In the Linux kernel, the following vulnerability has been resolved:net: sfp: fix memory leak in sfp_probe()sfp_probe() allocates a memory chunk from sfp with sfp_alloc(). When
devm_add_action() fails, sfp is not freed, which leads to a memory leak.We should use devm_add_action_or_reset() instead of devm_add_action(). | []
|
|
CVE-2016-6426 | The j_spring_security_switch_user function in Cisco Unified Intelligence Center (CUIC) 8.5.4 through 9.1(1), as used in Unified Contact Center Express 10.0(1) through 11.0(1), allows remote attackers to create user accounts by visiting an unspecified web page, aka Bug IDs CSCuy75027 and CSCuy81653. | [
"cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_intelligence_center:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_intelligence_center:9.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_intelligence_center:9.1\\(1\\):*:*:*:*:*:*:*"
]
|
|
GHSA-46hf-rj98-6qj6 | Out of bounds writing is possible while verifying device IDs due to improper length check before copying the data in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile | []
|
|
CVE-2006-0708 | Multiple buffer overflows in NullSoft Winamp 5.13 and earlier allow remote attackers to execute arbitrary code via (1) an m3u file containing a long URL ending in .wma, (2) a pls file containing a File1 field with a long URL ending in .wma, or (3) an m3u file with a long filename, variants of CVE-2005-3188 and CVE-2006-0476. | [
"cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*"
]
|
|
CVE-2024-1784 | Limbas main_admin.php sql injection | A vulnerability classified as problematic was found in Limbas 5.2.14. Affected by this vulnerability is an unknown functionality of the file main_admin.php. The manipulation of the argument tab_group leads to sql injection. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:limbas:limbas:*:*:*:*:*:*:*:*"
]
|
GHSA-vqmg-8wmj-pjh7 | Cisco Application Visibility and Control (AVC) 15.3(3)JA, when FlexConnect is enabled, allows remote attackers to cause a denial of service (access-point outage) via a crafted UDP packet, aka Bug ID CSCuu47016. | []
|
|
GHSA-83r7-7p8q-v697 | Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows. | []
|
|
GHSA-8r99-55wv-pvmp | A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384.82230 allows remote attackers to trigger DoS via network packet. | []
|
|
GHSA-8767-cjwc-5qp3 | PHP remote file inclusion vulnerability in index.php in FlashGameScript 1.5.4 allows remote attackers to execute arbitrary PHP code via a URL in the func parameter. | []
|
|
CVE-2009-3258 | vtiger CRM before 5.1.0 allows remote authenticated users, with certain View privileges, to delete (1) attachments, (2) reports, (3) filters, (4) views, and (5) tickets; insert (6) attachments, (7) reports, (8) filters, (9) views, and (10) tickets; and edit (11) reports, (12) filters, (13) views, and (14) tickets via unspecified vectors. | [
"cpe:2.3:a:vtiger:vtiger_crm:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:3:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:3.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4:beta:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4:beta:*:it:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4.2:*:*:*:validation:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:5.1.0:rc:*:*:*:*:*:*"
]
|
|
GHSA-h764-9p8w-qwwf | Integer overflow in Google Chrome before 13.0.782.215 on 32-bit platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving uniform arrays. | []
|
|
CVE-2022-45138 | WAGO: Missing Authentication for Critical Function | The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device. | [
"cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*"
]
|
GHSA-223r-2r23-qr43 | An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1294. | []
|
|
CVE-2024-0410 | Improper Enforcement of Behavioral Workflow in GitLab | An authorization bypass vulnerability was discovered in GitLab affecting versions 15.1 prior to 16.7.6, 16.8 prior to 16.8.3, and 16.9 prior to 16.9.1. A developer could bypass CODEOWNERS approvals by creating a merge conflict. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.9.0:*:*:*:*:*:*:*"
]
|
GHSA-4rv2-f267-rh4v | The LabTools WordPress plugin through 1.0 does not have proper authorisation and CSRF check in place when deleting publications, allowing any authenticated users, such as subscriber to delete arbitrary publication | []
|
|
GHSA-xp69-6p8j-w8m5 | An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can delete import information about a user's company. | []
|
|
CVE-2017-4016 | Web Server method disclosure in the server in McAfee Network Data Loss Prevention (NDLP) 9.3.x allows remote attackers to exploit and find another hole via HTTP response header. | [
"cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*"
]
|
|
GHSA-v943-7xrm-g7pr | Cross Site Scripting vulnerability in Nagios Log Server v.2024R1.3.1 allows a remote attacker to execute arbitrary code via a payload into the Email field. | []
|
|
GHSA-4p9f-r8qj-23xf | SQL injection vulnerability in index.php in OpenDocMan 1.2.5 allows remote attackers to execute arbitrary SQL commands via the frmpass (aka Password) parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.