id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
GHSA-2whc-3w32-64h4
Use after free in WebCodecs in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
GHSA-735p-77gm-m958
Integer overflow in the _NtSetValueKey function in klif.sys in Kaspersky Anti-Virus, Anti-Virus for Workstations, Anti-Virus for File Server 6.0, and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows context-dependent attackers to execute arbitrary code via a large, unsigned "data size argument," which results in a heap overflow.
[]
GHSA-p2f3-rm9r-rxgj
In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive endpoints by including '/auth/' in the path. As a result, attackers can obtain and modify sensitive data and utilize other organizations' resources without proper authentication.
[]
GHSA-hpmx-q5w5-cj4c
cPanel before 74.0.0 allows file modification in the context of the root account because of incorrect HTTP authentication (SEC-424).
[]
CVE-2022-3268
Weak Password Requirements in ikus060/minarca
Weak Password Requirements in GitHub repository ikus060/minarca prior to 4.2.2.
[ "cpe:2.3:a:ikus-soft:minarca:*:*:*:*:*:*:*:*" ]
CVE-2022-20006
In several functions of KeyguardServiceWrapper.java and related files,, there is a possible way to briefly view what's under the lockscreen due to a race condition. This could lead to local escalation of privilege if a Guest user is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-151095871
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
GHSA-7qfq-cp9v-rc33
A vulnerability was found in SourceCodester Prison Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /Account/login.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259692.
[]
GHSA-f7p4-fmmh-4p8x
ChakraCore RCE Vulnerability
The scripting engines in Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by the Chakra JavaScript engine, aka "Scripting Engine Memory Corruption Vulnerability."
[]
GHSA-cfv7-7278-j554
PayPal WPS ToolKit does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[]
GHSA-r823-2q58-c7vx
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the `syslog-ng` configuration file. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program.
[]
CVE-2021-4055
Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-2022-20761
Cisco 1000 Series Connected Grid Router Integrated Wireless Access Point Denial of Service Vulnerability
A vulnerability in the integrated wireless access point (AP) packet processing of the Cisco 1000 Series Connected Grid Router (CGR1K) could allow an unauthenticated, adjacent attacker to cause a denial of service condition on an affected device. This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the integrated AP to stop processing traffic, resulting in a DoS condition. It may be necessary to manually reload the CGR1K to restore AP operation.
[ "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*" ]
CVE-2016-9028
Unauthorized redirect vulnerability in Citrix NetScaler ADC before 10.1 135.8, 10.5 61.11, 11.0 65.31/65.35F and 11.1 47.14 allows a remote attacker to steal session cookies of a legitimate AAA user via manipulation of Host header.
[ "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:netscaler_application_delivery_controller:-:*:*:*:*:*:*:*" ]
GHSA-rr84-xgw4-q7v3
When extracting the incorrectly formatted flv file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion:Android-10Android ID: A-189402477
[]
CVE-2013-2928
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.90:*:*:*:*:*:*:*" ]
CVE-2023-20533
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
[ "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*" ]
GHSA-8mq2-g8h6-58cp
The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.
[]
GHSA-m75x-8gpr-mj3j
Mashov - CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
[]
GHSA-h36x-mcc8-r3vx
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LLC «TriIncom» Express Payments Module allows Blind SQL Injection.This issue affects Express Payments Module: from n/a through 1.1.8.
[]
CVE-2020-5589
SONY Wireless Headphones WF-1000X, WF-SP700N, WH-1000XM2, WH-1000XM3, WH-CH700N, WH-H900N, WH-XB700, WH-XB900N, WI-1000X, WI-C600N and WI-SP600N with firmware versions prior to 4.5.2 have vulnerability that someone within the Bluetooth range can make the Bluetooth pairing and operate such as changing volume of the product.
[ "cpe:2.3:o:sony:wf-1000x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wf-1000x:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wf-sp700n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wf-sp700n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wh-1000xm2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wh-1000xm2:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wh-1000xm3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wh-1000xm3:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wh-ch700n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wh-ch700n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wh-h900n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wh-h900n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wh-xb700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wh-xb700:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wh-xb900n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wh-xb900n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wi-1000x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wi-1000x:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wi-c600n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wi-c600n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:wi-sp600n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:wi-sp600n:-:*:*:*:*:*:*:*" ]
CVE-2024-26661
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' In "u32 otg_inst = pipe_ctx->stream_res.tg->inst;" pipe_ctx->stream_res.tg could be NULL, it is relying on the caller to ensure the tg is not NULL.
[]
CVE-2017-7419
NetIQ Access Manager OAuth Consent screen XSS attack
A OAuth application in NetIQ Access Manager 4.3 before 4.3.2 and 4.2 before 4.2.4 allowed cross site scripting attacks due to unescaped "description" field that could be specified by the provider.
[ "cpe:2.3:a:netiq:access_manager:*:*:*:*:*:*:*:*" ]
CVE-2019-12326
Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution.
[ "cpe:2.3:o:akuvox:sp-r50p_firmware:50.0.6.156:*:*:*:*:*:*:*", "cpe:2.3:h:akuvox:sp-r50p:-:*:*:*:*:*:*:*" ]
CVE-2024-10146
Simple File List < 6.1.13 - Reflected Cross-Site Scripting
The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
[ "cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*" ]
GHSA-3f8j-c578-3q4f
CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.740 allows CSRF via admin/index.php?module=rootpwd, as demonstrated by changing the root password.
[]
CVE-2020-6347
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated HDR file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
GHSA-w5qh-2x4h-crww
The Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.2-P8AE-FP002 grants a document's Creator-Owner full control over an annotation object, even if the default instance security has changed, which might allow remote authenticated users to bypass intended access restrictions in opportunistic circumstances.
[]
GHSA-56ff-m6pv-8594
Missing permission check in Jenkins VMware Lab Manager Slaves Plugin
A missing permission check in Jenkins VMware Lab Manager Slaves Plugin in the LabManager.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
[]
GHSA-rff2-w9c9-q4gc
Sourcecodester Best Courier Management System 1.0 is vulnerable to Arbitrary file upload in the update_user function.
[]
GHSA-jp75-4xf8-w783
Multiple directory traversal vulnerabilities in phpKF-Portal 1.10 allow remote attackers to include arbitrary files via a .. (dot dot) in the (1) tema_dizin parameter to baslik.php and (2) portal_ayarlarportal_dili parameter to anket_yonetim.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2001-1337
Beck IPC GmbH IPC@CHIP Embedded-Webserver allows remote attackers to cause a denial of service via a long HTTP request.
[ "cpe:2.3:a:beck_ipc_gmbh:ipc_at_chip_embedded-webserver:*:*:*:*:*:*:*:*" ]
CVE-2021-27193
Incorrect default permissions vulnerability in the API of Netop Vision Pro up to and including 9.7.1 allows a remote unauthenticated attacker to read and write files on the remote machine with system privileges resulting in a privilege escalation.
[ "cpe:2.3:a:netop:vision_pro:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-qp9c-v274-2239
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in gVectors Team wpForo Forum allows Content Spoofing.This issue affects wpForo Forum: from n/a through 2.0.9.
[]
GHSA-947j-6w79-84r8
Mengshen Wireless Door Alarm M70 2024-05-24 allows Authentication Bypass via a Capture-Replay approach.
[]
GHSA-4gv9-2936-gm5r
A vulnerability was found in java-aodeng Hope-Boot 1.0.0. It has been classified as problematic. Affected is the function doLogin of the file /src/main/java/com/hope/controller/WebController.java of the component Login. The manipulation of the argument redirect_url leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2021-44038
An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update.
[ "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*" ]
GHSA-xwch-gx2x-qj27
Remote Desktop Client Remote Code Execution Vulnerability.
[]
GHSA-wwr2-w2jp-vx63
Carel pCOWeb HVAC BACnet Gateway 2.1.0, Firmware: A2.1.0 - B2.1.0, Application Software: 2.15.4A Software v16 13020200 suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
[]
GHSA-8q3q-pcch-j42x
Windows SmartScreen Security Feature Bypass Vulnerability
[]
CVE-2023-4446
OpenRapid RapidCMS category.php sql injection
A vulnerability, which was classified as critical, was found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file template/default/category.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237567.
[ "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*" ]
CVE-2025-27127
A vulnerability has been identified in TIA Project-Server (All versions < V2.1.1), TIA Project-Server V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions), Totally Integrated Automation Portal (TIA Portal) V20 (All versions < V20 Update 3). The affected application improperly handles uploaded projects in the document root. This could allow an attacker with contributor privileges to cause denial of service by uploading a malicious project.
[]
CVE-2009-0637
The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command.
[ "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2l:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2rc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(23\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:12.4:*:*:*:*:*:*:*" ]
GHSA-frqr-9388-86wg
epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
[]
GHSA-p836-3j4x-6q4q
Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture.
[]
CVE-2004-0055
The print_attr_string function in print-radius.c for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.
[ "cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*" ]
CVE-2014-4667
The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
GHSA-97f8-83vc-c97q
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
[]
CVE-2021-39843
Adobe Acrobat Reader XObject Out-of-Bound Write Vulnerability
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*" ]
GHSA-7c5r-86cm-xrrp
Outlook Web App (OWA) in Microsoft Exchange Server 2007 SP3, 2010 SP3, and 2013 SP1 and Cumulative Update 6 does not properly validate tokens in requests, which allows remote attackers to spoof the origin of e-mail messages via unspecified vectors, aka "Outlook Web App Token Spoofing Vulnerability."
[]
CVE-2024-56923
Stored Cross-Site Scripting (XSS) Vulnerability in the Categorization Option of My Subscriptions Functionality in Silverpeas Core 6.3.1 <= 6.4.1 allows a remote attacker to execute arbitrary JavaScript code. This is achieved by injecting a malicious payload into the Name field of a subscription. The attack can lead to session hijacking, data theft, or unauthorized actions when an admin user views the affected subscription.
[]
GHSA-m66p-wxmq-pfc5
Stack-based buffer overflow in the File System Manager for EMC DiskXtender 6.20.060 allows remote authenticated users to execute arbitrary code via a crafted request to the RPC interface.
[]
CVE-2021-21242
Pre-Auth Unsafe Deserialization on AttachmentUploadServet
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or authorization checks. This issue may lead to pre-auth remote code execution. This issue was fixed in 4.0.3 by removing AttachmentUploadServlet and not using deserialization
[ "cpe:2.3:a:onedev_project:onedev:*:*:*:*:*:*:*:*" ]
CVE-2021-31755
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
[ "cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*" ]
CVE-2017-20143
Itech Movie Portal Script film-rating.php Error sql injection
A vulnerability, which was classified as critical, has been found in Itech Movie Portal Script 7.36. This issue affects some unknown processing of the file /film-rating.php. The manipulation of the argument v leads to sql injection (Error). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:ambit:movie_portal_script:7.36:*:*:*:*:*:*:*" ]
CVE-2017-12422
NetApp StorageGRID Webscale 10.2.x before 10.2.2.3, 10.3.x before 10.3.0.4, and 10.4.x before 10.4.0.2 allow remote authenticated users to delete arbitrary objects via unspecified vectors.
[ "cpe:2.3:a:netapp:storagegrid_webscale:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid_webscale:10.4.0.1:*:*:*:*:*:*:*" ]
CVE-2024-47634
WordPress CartBounty plugin <= 8.2 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Streamline.Lv CartBounty – Save and recover abandoned carts for WooCommerce allows Cross Site Request Forgery.This issue affects CartBounty – Save and recover abandoned carts for WooCommerce: from n/a through 8.2.
[ "cpe:2.3:a:woocommerce:streamline.lv:*:*:*:*:*:*:*:*", "cpe:2.3:a:majas-lapu-izstrade:cartbounty:*:*:*:*:*:wordpress:*:*" ]
GHSA-pgmq-fmcf-6fcm
An issue was discovered in GitLab Community and Enterprise Edition 11 through 12.4 when building Nested GraphQL queries. It has a large or infinite loop.
[]
GHSA-2573-rpmq-pq99
A null pointer dereference was addressed with improved validation. This issue is fixed in macOS High Sierra 10.13, iCloud for Windows 7.0, watchOS 4, iOS 11, iTunes 12.7 for Windows. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution.
[]
CVE-2019-18254
BIOTRONIK CardioMessenger II, The affected products do not encrypt sensitive information while at rest. An attacker with physical access to the CardioMessenger can disclose medical measurement data and the serial number from the implanted cardiac device the CardioMessenger is paired with.
[ "cpe:2.3:o:biotronik:cardiomessenger_ii-s_gsm_firmware:2.20:*:*:*:*:*:*:*", "cpe:2.3:h:biotronik:cardiomessenger_ii-s_gsm:-:*:*:*:*:*:*:*", "cpe:2.3:o:biotronik:cardiomessenger_ii-s_t-line_firmware:2.20:*:*:*:*:*:*:*", "cpe:2.3:h:biotronik:cardiomessenger_ii-s_t-line:-:*:*:*:*:*:*:*" ]
GHSA-4h2m-fw75-5h66
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart.
[]
CVE-2006-0085
SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin parameters.
[ "cpe:2.3:a:nkads:nkads:1.0alfa2:*:*:*:*:*:*:*", "cpe:2.3:a:nkads:nkads:1.0alfa3:*:*:*:*:*:*:*" ]
CVE-2021-43197
In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
GHSA-4x89-p7jf-f9rj
Buffer overflow in the auto_filter_extern function in auto.c for NapShare 1.2, with the extern filter enabled, allows remote attackers to execute arbitrary code via a crafted gnutella response.
[]
CVE-2021-41293
ECOA BAS controller - Path Traversal-3
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.
[ "cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*", "cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*", "cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*" ]
CVE-2010-0881
Unspecified vulnerability in the User Interface Components in Oracle Collaboration Suite 10.1.2.4 allows remote attackers to affect integrity via unknown vectors.
[ "cpe:2.3:a:oracle:collaboration_suite:10.1.2.4:*:*:*:*:*:*:*" ]
GHSA-mxx7-46g9-wqp8
u'Use out of range pointer issue can occur due to incorrect buffer range check during the execution of qseecom.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8098, Bitra, MSM8909W, MSM8996AU, Nicobar, QCM2150, QCS605, Saipan, SDM429W, SDX20, SM6150, SM8150, SM8250, SXR2130
[]
CVE-2001-0112
Multiple buffer overflows in splitvt before 1.6.5 allow local users to execute arbitrary commands.
[ "cpe:2.3:a:sam_lantinga:splitvt:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*" ]
GHSA-6xp6-fmc8-pmmr
Temporary Directory Hijacking Vulnerability in Keycloak
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
[]
GHSA-f78j-4w3g-4q65
StimulusReflex arbitrary method call
SummaryMore methods than expected can be called on reflex instances. Being able to call some of them has security implications.DetailsTo invoke a reflex a websocket message of the following shape is sent:The server will proceed to instantiate `reflex` using the provided `class_name` as long as it extends `StimulusReflex::Reflex`. It then attempts to call `method_name` on the instance with the provided arguments [ref](https://github.com/stimulusreflex/stimulus_reflex/blob/0211cad7d60fe96838587f159d657e44cee51b9b/app/channels/stimulus_reflex/channel.rb#L83):This is problematic as `reflex.method(method_name)` can be more methods than those explicitly specified by the developer in their reflex class. A good example is the `instance_variable_set` method.This variable can be overwritten using the following message:Here are other interesting methods that were found to be available for the [ChatReflex sample reflex](https://github.com/hopsoft/stimulus_reflex_expo/blob/dcce8c36a6782d1e7f57f0e2766a3f6fd770b3b1/app/reflexes/chat_reflex.rb)`remote_byebug`: bind a debugging server`pry`: drop the process in a REPL sessionAll in all, only counting `:req` and `:opt` parameters helps. For example around [version 1.0](https://github.com/stimulusreflex/stimulus_reflex/blob/1f610b636abfed27de2c61104aebd1ac98180d5b/lib/stimulus_reflex/channel.rb#L41) only `.arity` was checked which allowed access to the `system` method (`.arity == -1`)Using `public_send` instead of `send` does not help but the following payloads **do not** work since `:rest` parameters are not counted in the current versionPre-versions of 3.5.0 added a `render_collection` method on reflexes with a `:req` parameter. Calling this method could lead to arbitrary code execution:PatchesPatches are [available on RubyGems](https://rubygems.org/gems/stimulus_reflex) and on [NPM](https://npmjs.org/package/stimulus_reflex).The patched versions are:[`3.4.2`](https://github.com/stimulusreflex/stimulus_reflex/releases/tag/v3.4.2)[`3.5.0.rc4`](https://github.com/stimulusreflex/stimulus_reflex/releases/tag/v3.5.0.rc4)WorkaroundYou can add this guard to mitigate the issue if running an unpatched version of the library.1.) Make sure all your reflexes inherit from the `ApplicationReflex` class 2.) Add this `before_reflex` callback to your `app/reflexes/application_reflex.rb` file:
[]
GHSA-pw34-h328-wph6
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
[]
CVE-2019-1964
Cisco NX-OS Software IPv6 Denial of Service Vulnerability
A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device.
[ "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7000_10-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7000_18-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7000_4-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7000_9-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7700_10-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7700_18-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7700_2-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7700_6-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*" ]
GHSA-8gwx-rjhp-hpgr
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. The issue involves the "SQLite" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[]
CVE-2011-4603
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.
[ "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*" ]
CVE-2018-2795
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*", "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*" ]
CVE-2000-1119
Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument.
[ "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*" ]
CVE-2023-38907
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.
[ "cpe:2.3:o:tp-link:tapo_l530e_firmware:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tapo_l530e:-:*:*:*:*:*:*:*", "cpe:2.3:a:tp-link:tapo:2.8.14:*:*:*:*:*:*:*" ]
CVE-2005-0771
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
[ "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*" ]
CVE-2024-10639
Auto Prune Posts < 3.0.0- Admin+ Stored XSS
The Auto Prune Posts WordPress plugin before 3.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
CVE-2023-36872
VP9 Video Extensions Information Disclosure Vulnerability
VP9 Video Extensions Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:vp9_video_extensions:*:*:*:*:*:*:*:*" ]
GHSA-924j-9954-rvrv
Meinberg Lantime M300 and M1000 devices allow attackers (with privileges to configure a device) to execute arbitrary OS commands by editing the /config/netconf.cmd script (aka Extended Network Configuration).
[]
CVE-2016-4121
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1097, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, and CVE-2016-4110.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*" ]
CVE-2018-8343
An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows NDIS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8342.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:itanium:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:itanium:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*" ]
GHSA-fcgh-hm5r-m53h
A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/admin/ajax.php?action=save_product. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264463.
[]
GHSA-hfh4-4cfx-9mmf
Cross-site scripting (XSS) vulnerability in the textile formatter in Redmine before 1.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2025-38233
powerpc64/ftrace: fix clobbered r15 during livepatching
In the Linux kernel, the following vulnerability has been resolved: powerpc64/ftrace: fix clobbered r15 during livepatching While r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is not restored in livepatch sequence leading to not so obvious fails like below: BUG: Unable to handle kernel data access on write at 0xc0000000000f9078 Faulting instruction address: 0xc0000000018ff958 Oops: Kernel access of bad area, sig: 11 [#1] ... NIP: c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790 REGS: c00000005f2e7790 TRAP: 0300 Tainted: G K (6.14.0+) MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 2822880b XER: 20040000 CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1 GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488 GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000 GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070 GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000 GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88 GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000 GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078 ... Call Trace: check_heap_object+0x34/0x390 (unreliable) __mutex_unlock_slowpath.isra.0+0xe4/0x230 seq_read_iter+0x430/0xa90 proc_reg_read_iter+0xa4/0x200 vfs_read+0x41c/0x510 ksys_read+0xa4/0x190 system_call_exception+0x1d0/0x440 system_call_vectored_common+0x15c/0x2ec Fix it by restoring r15 always.
[]
GHSA-3q85-vgcx-wv5m
In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.
[]
GHSA-2xcc-5x48-fhp2
Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function formSetQosBand.
[]
CVE-2022-34423
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
[ "cpe:2.3:o:dell:r6515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r6515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe8545_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe8545:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r6415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r6415:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7415:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7425_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7425:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r750xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r750xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r650:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:mx750c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:mx750c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r650xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r650xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r750xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r750xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xr11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xr11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xr12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xr12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t150:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r740xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r740xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r740xd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r740xd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r840_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r840:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r940xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r940xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m640p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m640p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:mx740c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:mx740c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:mx840c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:mx840c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c4140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c4140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:dss8440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:dss8440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe2420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe2420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe7440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe7440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r730xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r730xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c4130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c4130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m630p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m630p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m830p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m830p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3340:-:*:*:*:*:*:*:*" ]
GHSA-xgcq-vm6g-cgh7
Cross-Site Scripting (XSS) vulnerability found in Rawchen blog-ssm v1.0 allows attackers to execute arbitrary code via the 'notifyInfo' parameter.
[]
CVE-2021-20988
Hilscher rcX RTOS: Wrong handling of the UDP checksum
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
[ "cpe:2.3:a:hilscher:rcx_rtos:*:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-16di-g60l-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-16di-g60l-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-16dio-g60l-c1-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-16dio-g60l-c1-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-16dio-g60l-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-16dio-g60l-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-8di8do-g60l-c1-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-8di8do-g60l-c1-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-8di8do-g60l-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-8di8do-g60l-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-8iol-g30l-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-8iol-g30l-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-8iol-g60l-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-8iol-g60l-v1d:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:ice1-8iol-s2-g60l-v1d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:pepperl-fuchs:ice1-8iol-s2-g60l-v1d:-:*:*:*:*:*:*:*" ]
CVE-2020-3410
Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability
A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*" ]
CVE-2021-1531
Cisco Modeling Labs Web UI Command Injection Vulnerability
A vulnerability in the web UI of Cisco Modeling Labs could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the web application on the underlying operating system of an affected Cisco Modeling Labs server. This vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected server. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the web application, virl2, on the underlying operating system of the affected server. To exploit this vulnerability, the attacker must have valid user credentials on the web UI.
[ "cpe:2.3:a:cisco:modeling_labs:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.1.3:*:*:*:*:*:*:*" ]
CVE-2024-27287
ESPHome vulnerable to stored Cross-site Scripting in edit configuration file API
ESPHome is a system to control your ESP8266/ESP32 for Home Automation systems. Starting in version 2023.12.9 and prior to version 2024.2.2, editing the configuration file API in dashboard component of ESPHome version 2023.12.9 (command line installation and Home Assistant add-on) serves unsanitized data with `Content-Type: text/html; charset=UTF-8`, allowing a remote authenticated user to inject arbitrary web script and exfiltrate session cookies via Cross-Site scripting. It is possible for a malicious authenticated user to inject arbitrary Javascript in configuration files using a POST request to the /edit endpoint, the configuration parameter allows to specify the file to write. To trigger the XSS vulnerability, the victim must visit the page` /edit?configuration=[xss file]`. Abusing this vulnerability a malicious actor could perform operations on the dashboard on the behalf of a logged user, access sensitive information, create, edit and delete configuration files and flash firmware on managed boards. In addition to this, cookies are not correctly secured, allowing the exfiltration of session cookie values. Version 2024.2.2 contains a patch for this issue.
[ "cpe:2.3:a:esphome:esphome:*:*:*:*:*:*:*:*" ]
CVE-2020-25173
Reolink P2P Cameras
An attacker with local network access can obtain a fixed cryptography key which may allow for further compromise of Reolink P2P cameras outside of local network access
[ "cpe:2.3:o:reolink:rln8-410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rln8-410:-:*:*:*:*:*:*:*", "cpe:2.3:o:reolink:rlc-422_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-422:-:*:*:*:*:*:*:*", "cpe:2.3:o:reolink:rlc-510a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-510a:-:*:*:*:*:*:*:*", "cpe:2.3:o:reolink:rlc-423s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-423s:-:*:*:*:*:*:*:*", "cpe:2.3:o:reolink:rlc-423_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-423:-:*:*:*:*:*:*:*", "cpe:2.3:o:reolink:rlc-410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-410:-:*:*:*:*:*:*:*", "cpe:2.3:o:reolink:rlc-520a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-520a:-:*:*:*:*:*:*:*" ]
GHSA-7vgw-g2hc-25j8
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
[]
CVE-2001-1158
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
[ "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1_build_41439:*:*:*:*:*:*:*" ]
CVE-2024-38512
A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.
[ "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx_enclosure_certified_node_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1021_edg_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx1020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530_f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx1320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3520-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7320_n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7520_n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_dual_node_tray_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_se350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr250_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr258_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr590_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr655_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr675_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st258_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v3_firmware:-:*:*:*:*:*:*:*" ]
GHSA-pmj7-4375-32j4
In the Linux kernel, the following vulnerability has been resolved:blk-mq: Fix kmemleak in blk_mq_init_allocated_queueThere is a kmemleak caused by modprobe null_blk.kounreferenced object 0xffff8881acb1f000 (size 1024): comm "modprobe", pid 836, jiffies 4294971190 (age 27.068s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 00 53 99 9e ff ff ff ff .........S...... backtrace: [<000000004a10c249>] kmalloc_node_trace+0x22/0x60 [<00000000648f7950>] blk_mq_alloc_and_init_hctx+0x289/0x350 [<00000000af06de0e>] blk_mq_realloc_hw_ctxs+0x2fe/0x3d0 [<00000000e00c1872>] blk_mq_init_allocated_queue+0x48c/0x1440 [<00000000d16b4e68>] __blk_mq_alloc_disk+0xc8/0x1c0 [<00000000d10c98c3>] 0xffffffffc450d69d [<00000000b9299f48>] 0xffffffffc4538392 [<0000000061c39ed6>] do_one_initcall+0xd0/0x4f0 [<00000000b389383b>] do_init_module+0x1a4/0x680 [<0000000087cf3542>] load_module+0x6249/0x7110 [<00000000beba61b8>] __do_sys_finit_module+0x140/0x200 [<00000000fdcfff51>] do_syscall_64+0x35/0x80 [<000000003c0f1f71>] entry_SYSCALL_64_after_hwframe+0x46/0xb0That is because q->ma_ops is set to NULL before blk_release_queue is called.blk_mq_init_queue_data blk_mq_init_allocated_queue blk_mq_realloc_hw_ctxs for (i = 0; i < set->nr_hw_queues; i++) { old_hctx = xa_load(&q->hctx_table, i); if (!blk_mq_alloc_and_init_hctx(.., i, ..)) [1] if (!old_hctx) break;err_exit: q->mq_ops = NULL; [4]blk_put_queue blk_release_queue if (queue_is_mq(q)) [5] blk_mq_release(q);[1]: blk_mq_alloc_and_init_hctx failed at i != 0. [2]: The hctxs allocated by [1] are moved to q->unused_hctx_list and will be cleaned up in blk_mq_release. [3]: q->nr_hw_queues is 0. [4]: Set q->mq_ops to NULL. [5]: queue_is_mq returns false due to [4]. And blk_mq_release will not be called. The hctxs in q->unused_hctx_list are leaked.To fix it, call blk_release_queue in exception path.
[]
GHSA-97hx-q9jc-cw6p
An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) software. A connection to a new Bluetooth devices can be established from the lock screen. The Samsung ID is SVE-2019-15533 (December 2019).
[]
CVE-2005-4378
SQL injection vulnerability in Page.asp in Baseline CMS 1.95 and earlier allows remote attackers to execute arbitrary SQL commands via the SiteNodeID parameter.
[ "cpe:2.3:a:nma:baseline_cms:*:*:*:*:*:*:*:*" ]