id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2016-4158
|
Unquoted Windows search path vulnerability in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory.
|
[
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:creative_cloud:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | 6.9 | null |
|
CVE-2019-8528
|
A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | 7.2 | null |
|
GHSA-wqm4-3xr2-4rh8
|
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console could allow a remote attacker to obtain sensitive information when a specially crafted url causes a stack trace to be dumped. IBM X-Force ID: 160202.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-40960
|
ipv6: prevent possible NULL dereference in rt6_probe()
|
In the Linux kernel, the following vulnerability has been resolved:
ipv6: prevent possible NULL dereference in rt6_probe()
syzbot caught a NULL dereference in rt6_probe() [1]
Bail out if __in6_dev_get() returns NULL.
[1]
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]
CPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]
RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758
Code: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19
RSP: 0018:ffffc900034af070 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000
RDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c
RBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a
R13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000
FS: 00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784
nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496
__find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825
find_rr_leaf net/ipv6/route.c:853 [inline]
rt6_select net/ipv6/route.c:897 [inline]
fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195
ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231
pol_lookup_func include/net/ip6_fib.h:616 [inline]
fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121
ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]
ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651
ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147
ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250
rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898
inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
sock_write_iter+0x4b8/0x5c0 net/socket.c:1160
new_sync_write fs/read_write.c:497 [inline]
vfs_write+0x6b6/0x1140 fs/read_write.c:590
ksys_write+0x1f8/0x260 fs/read_write.c:643
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2010-1362
|
Cross-site scripting (XSS) vulnerability in the Own Term module 6.x-1.0 for Drupal allows remote authenticated users, with "create additional terms" privileges, to inject arbitrary web script or HTML via the term description field in a term listing page.
|
[
"cpe:2.3:a:ben_jeavons:ownterm:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2013-7317
|
Multiple cross-site scripting (XSS) vulnerabilities in CS-Cart before 4.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) settings_file or (2) data_file parameter to (a) ampie.swf, (b) amline.swf, or (c) amcolumn.swf.
|
[
"cpe:2.3:a:cs-cart:cs-cart:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cs-cart:cs-cart:4.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2007-1077
|
SQL injection vulnerability in page.asp in Design4Online UserPages2 2.0 allows remote attackers to execute arbitrary SQL commands via the art_id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:design4online:userpages2:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-pvpc-7x96-x9f5
|
Open redirect vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack via a specially crafted URL.
|
[] | null | null | null | null | null |
|
ICSA-23-012-09
|
Siemens Mendix SAML Module
|
The affected module is vulnerable to reflected cross-site scripting (XSS) attacks. This could allow an attacker to extract sensitive information by tricking users into accessing a malicious link.
|
[] | null | 9.3 | null | null | null |
GHSA-gq38-75hc-xc85
|
The umeshpatil-dev/Home__internet repository through 2020-08-28 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
|
[] | null | 9.3 | null | null | null |
|
CVE-2024-22161
|
WordPress HD Quiz Plugin <= 1.8.11 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Harmonic Design HD Quiz allows Stored XSS.This issue affects HD Quiz: from n/a through 1.8.11.
|
[
"cpe:2.3:a:harmonicdesign:hd_quiz:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-vm5j-vqr6-v7v8
|
OS Command Injection in pixl-class
|
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
|
[] | null | 9.8 | null | null | null |
GHSA-72pf-46cp-4rhv
|
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, and 8.1 (North America CDMA) software. The LTE protocol implementation allows a bypass of AKA (Authentication and Key Agreement). The LG ID is LVE-SMP-180014 (February 2019).
|
[] | null | null | null | null | null |
|
GHSA-xgp2-f259-4rjq
|
Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter.
|
[] | null | null | null | null | null |
|
GHSA-6wxq-8rgv-3c23
|
Memory corruption in kernel due to improper input validation while processing ION commands in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
|
[] | null | 6.7 | null | null | null |
|
GHSA-7h73-9whc-fg4g
|
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-4805
|
Tutor LMS < 2.3.0 - Subscriber+ Stored Cross-Site Scripting
|
The Tutor LMS WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow users such as subscriber to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[
"cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
cisco-sa-20190501-asa-ftd-xss
|
Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerabilities
|
Multiple vulnerabilities in the WebVPN service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the WebVPN portal of an affected device.
The vulnerabilities exist because the software insufficiently validates user-supplied input on an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. An attacker would need administrator privileges on the device to exploit these vulnerabilities.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-xss ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-xss"]
|
[] | null | null | 4.8 | null | null |
GHSA-796m-gmh7-7w8m
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in John Housholder Emma for WordPress allows Stored XSS. This issue affects Emma for WordPress: from n/a through 1.3.3.
|
[] | null | 6.5 | null | null | null |
|
GHSA-qr3c-c5p2-m2mf
|
** DISPUTED ** Race condition in avast! Internet Security 5.0.462 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute.
|
[] | null | null | null | null | null |
|
CVE-2023-45863
|
An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null | null |
|
RHSA-2019:3201
|
Red Hat Security Advisory: Ansible security update
|
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | 5 | 6.4 | null | null |
CVE-2005-0749
|
The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.27:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.99:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-cgrq-wvfj-v28j
|
Mage AI allows remote unauthenticated attackers to leak the terminal server command history of arbitrary users
|
Mage AI allows remote unauthenticated attackers to leak the terminal server command history of arbitrary users.
|
[] | 6.9 | 5.3 | null | null | null |
RHSA-2013:1100
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: qemu-ga win32 service unquoted search path
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2017-10885
|
Untrusted search path vulnerability in HYPER SBI Ver. 2.2 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:sbisec:hyper_sbi:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-4xfw-599q-fmp6
|
Dolibarr stored cross-site scripting (XSS) vulnerability
|
A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "address" (POST) or "town" (POST) parameter to adherents/type.php.
|
[] | null | null | 5.4 | null | null |
RHSA-2016:0465
|
Red Hat Security Advisory: openssh security update
|
openssh: possible fallback from untrusted to trusted X11 forwarding openssh: missing sanitisation of input for X11 forwarding
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
RHSA-2016:1664
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: challenge ACK counter information disclosure.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.8 | null | null |
CVE-2020-24026
|
TinyShop, a free and open source mall based on RageFrame2, has a stored XSS vulnerability that affects version 1.2.0. TinyShop allows XSS via the explain_first and again_explain parameters of the /evaluate/index.php page. The vulnerability may be exploited remotely, resulting in cross-site scripting (XSS) or information disclosure.
|
[
"cpe:2.3:a:tinyshop_project:tinyshop:1.2.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-x783-gcp6-f536
|
The web framework in the server in Cisco Unified MeetingPlace Web Conferencing allows remote attackers to bypass intended access restrictions and read unspecified web pages via crafted parameters, aka Bug ID CSCuh86385.
|
[] | null | null | null | null | null |
|
GHSA-hm57-h27x-599c
|
Mattermost incorrectly issues two sessions when using desktop SSO
|
Mattermost versions 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 incorrectly issues two sessions when using desktop SSO - one in the browser and one in desktop with incorrect settings.
|
[] | 2.4 | 3.5 | null | null | null |
CVE-2008-5700
|
libata in the Linux kernel before 2.6.27.9 does not set minimum timeouts for SG_IO requests, which allows local users to cause a denial of service (Programmed I/O mode on drives) via multiple simultaneous invocations of an unspecified test program.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2012-4894
|
Google SketchUp before 8.0.14346 (aka 8 Maintenance 3) allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SKP file.
|
[
"cpe:2.3:a:google:sketchup:*:maintenance_2:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:6.0:maintenance_6:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:7.0:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:7.1:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:7.1:maintenance_2:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:sketchup:8.0:maintenance_1:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-c949-3ppw-h395
|
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 6.1 | null | null | null |
|
CVE-2017-8332
|
An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of blocking key words passing in the web traffic to prevent kids from watching content that might be deemed unsafe using the web management interface. It seems that the device does not implement any cross-site scripting protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a stored cross-site scripting payload on the user's browser and execute any action on the device provided by the web management interface.
|
[
"cpe:2.3:o:securifi:almond_2015_firmware:al-r096:*:*:*:*:*:*:*",
"cpe:2.3:h:securifi:almond_2015:-:*:*:*:*:*:*:*",
"cpe:2.3:o:securifi:almond\\+firmware:al-r096:*:*:*:*:*:*:*",
"cpe:2.3:h:securifi:almond\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:securifi:almond_firmware:al-r096:*:*:*:*:*:*:*",
"cpe:2.3:h:securifi:almond:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-3wpq-r344-mg23
|
Cross-site scripting (XSS) vulnerability in index.php in the eWebsite eWeather (Weather) module for PHP-Nuke allows remote attackers to inject arbitrary web script or HTML via the chart parameter to modules.php.
|
[] | null | null | null | null | null |
|
CVE-2024-6550
|
Gravity Forms: Multiple Form Instances <= 1.1.1 - Unauthenticated Full Path Disclosure
|
The Gravity Forms: Multiple Form Instances plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.1.1. This is due to the plugin leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
|
[
"cpe:2.3:a:nikunj:gravity_forms_multiple_form_instances:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-57gr-jvqr-3hwm
|
Incorrect access control in typo3_forum
|
The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control.
|
[] | null | 5.3 | null | null | null |
CVE-2021-29325
|
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_String_prototype_repeat function at /moddable/xs/sources/xsString.c.
|
[
"cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2010-2101
|
The (1) strip_tags, (2) setcookie, (3) strtok, (4) wordwrap, (5) str_word_count, and (6) str_pad functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
|
[
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2025-39552
|
WordPress Zephyr Project Manager <= 3.3.200 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Dylan James Zephyr Project Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Zephyr Project Manager: from n/a through 3.3.200.
|
[] | null | 5.4 | null | null | null |
CVE-2024-47000
|
Service Users Deactivation not Working in Zitadel
|
Zitadel is an open source identity management platform. ZITADEL's user account deactivation mechanism did not work correctly with service accounts. Deactivated service accounts retained the ability to request tokens, which could lead to unauthorized access to applications and resources. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised t upgrade. Users unable to upgrade may instead of deactivating the service account, consider creating new credentials and replacing the old ones wherever they are used. This effectively prevents the deactivated service account from being utilized. Be sure to revoke all existing authentication keys associated with the service account and to rotate the service account's password.
|
[
"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zitadel:zitadel:2.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zitadel:zitadel:2.62.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
GHSA-73wq-fqgr-pmvw
|
Multiple cross-site scripting (XSS) vulnerabilities in OSClass before 3.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) action or (2) nsextt parameter to oc-admin/index.php or the (3) nsextt parameter in an items_reported action to oc-admin/index.php.
|
[] | null | null | null | null | null |
|
GHSA-8fr6-p7rj-wmfr
|
Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
|
[] | null | null | null | null | null |
|
CVE-2025-25085
|
WordPress WP SimpleWeather plugin <= 0.2.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in matt_mcbrien WP SimpleWeather allows Stored XSS. This issue affects WP SimpleWeather: from n/a through 0.2.5.
|
[] | null | 6.5 | null | null | null |
GHSA-2qff-fp25-r737
|
AdMan 1.0.20051221 and earlier allows remote attackers to obtain the full path via (1) a blank campaignId parameter to editCampaign.php and (2) a blank schemeId parameter to viewPricingScheme.php.
|
[] | null | null | null | null | null |
|
CVE-2022-41056
|
Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
|
Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-9mpf-qr4j-4fp9
|
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
|
[] | null | null | null | null | null |
|
GHSA-hpcw-47wp-rc8h
|
Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-17643.
|
[] | null | null | 3.1 | null | null |
|
GHSA-3rhq-2g85-5xqr
|
Stack-based buffer overflow in Symantec Decomposer, as used in certain Symantec antivirus products including Symantec Scan Engine 5.1.2 and other versions before 5.1.6.31, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a malformed RAR file to the Internet Content Adaptation Protocol (ICAP) port (1344/tcp).
|
[] | null | null | null | null | null |
|
GHSA-x44q-9q24-vjf9
|
An integer overflow was addressed through improved input validation. This issue is fixed in visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.
|
[] | null | 5.5 | null | null | null |
|
GHSA-6mcg-qcwq-jvvg
|
In ColorOS (oppo mobile phone operating system, based on AOSP frameworks/native code position/services/surfaceflinger surfaceflinger.CPP), RGB is defined on the stack but uninitialized, so when the screenShot function to RGB value assignment, will not initialize the value is returned to the attackers, leading to values on the stack information leakage, the vulnerability can be used to bypass attackers ALSR.
|
[] | null | null | null | null | null |
|
CVE-2020-35947
|
An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. Nearly all of the AJAX action endpoints lacked permission checks, allowing these actions to be executed by anyone authenticated on the site. This happened because nonces were used as a means of authorization, but a nonce was present in a publicly viewable page. The greatest impact was the pagelayer_save_content function that allowed pages to be modified and allowed XSS to occur.
|
[
"cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*"
] | null | 7.4 | null | null | null |
|
GHSA-8wqw-63ph-wx4h
|
An access issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13. An app may be able to access user-sensitive data.
|
[] | null | 5.5 | null | null | null |
|
CVE-2007-3715
|
Sun Java System Application Server and Web Server 7.0 through 9.0 before 20070710 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute an arbitrary Java method via a crafted stylesheet, a related issue to CVE-2007-3716.
|
[
"cpe:2.3:a:sun:java_system_application_server:8.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:enterprise_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:enterprise_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:enterprise_windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:enterprise_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:platform:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:platform_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:platform_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:platform_windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:platform_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:9.0:*:platform:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:9.0:*:platform_linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:9.0:*:platform_sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:9.0:*:platform_windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:9.0:*:platform_x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:x86:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2006-7037
|
Mathcad 12 through 13.1 allows local users to bypass the security features by directly accessing or editing the XML representation of the worksheet with a text editor or other program, which allows attackers to (1) bypass password protection by replacing the password field with a hash of a known password, (2) modify timestamps to avoid detection of modifications, (3) remove locks by removing the "is-locked" attribute, and (4) view locked data, which is stored in plaintext.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*",
"cpe:2.3:a:mathsoft:mathcad:12:*:*:*:*:*:*:*",
"cpe:2.3:a:mathsoft:mathcad:13:*:*:*:*:*:*:*",
"cpe:2.3:a:mathsoft:mathcad:13.1:*:*:*:*:*:*:*"
] | null | null | null | 4.4 | null |
|
CVE-2003-0324
|
Buffer overflows in EPIC IRC Client (EPIC4) 1.0.1 allows remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via long replies that are not properly handled by the (1) userhost_cmd_returned function, or (2) Statusbar capability.
|
[
"cpe:2.3:a:epic:epic4:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-1000042
|
Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios via TileJSON Name.
|
[
"cpe:2.3:a:mapbox_project:mapbox:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.2:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.0.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mapbox_project:mapbox:2.1.6:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-qqr6-w2q9-87v2
|
Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow."
|
[] | null | null | null | null | null |
|
CVE-2024-40742
|
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the circuit ID parameter at /circuits/circuits/add.
|
[
"cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netbox:netbox:4.0.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-3pqv-3gf8-jfg6
|
Yahoo! Messenger 8.1.0.209 and 8.1.0.402 allows remote attackers to cause a denial of service (application crash) via certain file-transfer packets, possibly involving a buffer overflow, as demonstrated by ym8bug.exe. NOTE: this might be related to CVE-2007-4515. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2023-1614
|
WP Custom Author URL < 1.0.5 - Admin+ Stored XSS
|
The WP Custom Author URL WordPress plugin before 1.0.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:wp_custom_author_url_project:wp_custom_author_url:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null | null |
CVE-2022-23046
|
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
|
[
"cpe:2.3:a:phpipam:phpipam:1.4.4:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
GHSA-mw64-5p9w-rfgc
|
POST requests to /web/mvc in GX Software XperienCentral version 10.36.0 and earlier were not blocked for uses that are not logged in. If an unauthorized user is able to bypass other security filters they are able to post unauthorized data to the server because of CVE-2022-22965.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-35223
|
Execute Command Function Allows Remote Code Execution (RCE)Vulnerability
|
The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution.
|
[
"cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*"
] | null | 8.5 | null | null | null |
GHSA-xh3g-f95m-r3gg
|
An issue was discovered in MK-AUTH 19.01. XSS vulnerabilities in admin and client scripts allow an attacker to execute arbitrary JavaScript code.
|
[] | null | null | null | null | null |
|
GHSA-v6pj-9m3q-j6m8
|
** DISPUTED ** master-filter in printfilters-ppd 2.13 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filter.debug temporary file. NOTE: the vendor disputes this vulnerability, stating 'this package does not have " possibility of attack with the help of symlinks"'.
|
[] | null | null | null | null | null |
|
CVE-2024-34007
|
moodle: logout CSRF in admin/tool/mfa/auth.php
|
The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-j74r-g3fg-pr4g
|
WebKit in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1 allows remote attackers to bypass the Same Origin Policy via crafted Cascading Style Sheets (CSS) token sequences within an SVG file in the SRC attribute of an IMG element.
|
[] | null | null | null | null | null |
|
GHSA-jvcx-mvrg-5xrg
|
Multiple buffer overflows in CA XOsoft r12.0 and r12.5 allow remote attackers to execute arbitrary code via (1) a malformed request to the ws_man/xosoapapi.asmx SOAP endpoint or (2) a long string to the entry_point.aspx service.
|
[] | null | null | null | null | null |
|
GHSA-58jh-xrf3-5pp9
|
An issue was discovered in GeoVision GV-Edge Recording Manager 2.2.3.0 for windows, which contains improper permissions within the default installation and allows attackers to execute arbitrary code and gain escalated privileges.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-3013
|
SourceCodester Simple Task Managing System loginVaLidation.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423.
|
[
"cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
CVE-2018-18942
|
In baserCMS before 4.1.4, lib\Baser\Model\ThemeConfig.php allows remote attackers to execute arbitrary PHP code via the admin/theme_configs/form data[ThemeConfig][logo] parameter.
|
[
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
CVE-2010-5269
|
Untrusted search path vulnerability in tbb.dll in Intel Threading Building Blocks (TBB) 2.2.013 allows local users to gain privileges via a Trojan horse tbbmalloc.dll file in the current working directory, as demonstrated by a directory that contains a .pbk file. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:intel:threading_building_blocks:2.2.013:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2023-4338
|
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
|
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
|
[
"cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2024-5877
|
IrfanView PIC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
IrfanView PIC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PIC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write before the start of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23974.
|
[
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2020-9272
|
ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
|
[
"cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-hh26-f6cr-2h76
|
Outlook 2003, when replying to an e-mail message, stores certain files in a predictable location for the "src" of an img tag of the original message, which allows remote attackers to bypass zone restrictions and exploit other issues that rely on predictable locations, as demonstrated using a shell: URI.
|
[] | null | null | null | null | null |
|
GHSA-w9xp-xgf9-cvcf
|
Yealink YMCS RPS before 2025-06-04 lacks SN verification attempt limits, enabling brute-force enumeration (last five digits).
|
[] | null | 2.2 | null | null | null |
|
GHSA-rmc9-mpj8-qjrc
|
Cross-site request forgery (CSRF) vulnerability in adsense-deluxe.php in the AdSense-Deluxe 0.x plugin for WordPress allows remote attackers to perform unspecified actions as arbitrary users via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-c5gg-23m2-rg93
|
In the Linux kernel, the following vulnerability has been resolved:drm/panthor: Fix UAF in panthor_gem_create_with_handle() debugfs codeThe object is potentially already gone after the drm_gem_object_put().
In general the object should be fully constructed before calling
drm_gem_handle_create(), except the debugfs tracking uses a separate
lock and list and separate flag to denotate whether the object is
actually initialized.Since I'm touching this all anyway simplify this by only adding the
object to the debugfs when it's ready for that, which allows us to
delete that separate flag. panthor_gem_debugfs_bo_rm() already checks
whether we've actually been added to the list or this is some error
path cleanup.v2: Fix build issues for !CONFIG_DEBUGFS (Adrián)v3: Add linebreak and remove outdated comment (Liviu)
|
[] | null | null | null | null | null |
|
GHSA-4x95-346p-g442
|
parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-33469
|
COVID19 Testing Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the "Admin name" parameter.
|
[
"cpe:2.3:a:phpgurukul:covid19_testing_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-8mxq-g586-8g78
|
Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Protocol Independent Multicast (PIM) protocol within the VPN. This issue can only be exploited from the PE device within the MPLS domain which is capable of forwarding IP multicast traffic in core. End-users connected to the CE device cannot cause this crash. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.1 versions prior to 18.1R2. No other Juniper Networks products or platforms are affected by this issue.
|
[] | null | null | 8.8 | null | null |
|
CVE-2019-10136
|
It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.
|
[
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:spacewalk:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
|
CVE-2018-14280
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF XFA function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5619.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-36683
|
WordPress Schema Pro plugin <= 2.7.8 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in WP SCHEMA PRO Schema Pro.This issue affects Schema Pro: from n/a through 2.7.8.
|
[] | null | 6.5 | null | null | null |
RHSA-2020:1209
|
Red Hat Security Advisory: qemu-kvm-ma security update
|
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.6 | null | null | null |
GHSA-6mvr-cq72-f66v
|
XWiki XSS Vulnerability
|
The Image Import function in XWiki through 10.7 has XSS.
|
[] | null | null | 5.4 | null | null |
CVE-2015-4354
|
Cross-site scripting (XSS) vulnerability in the Ubercart Webform Integration module before 6.x-1.8 and 7.x before 7.x-2.4 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:ubercart_webform_integration_project:ubercart_webform_integration:6.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:ubercart_webform_integration_project:ubercart_webform_integration:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:ubercart_webform_integration_project:ubercart_webform_integration:7.x-2.0:*:*:*:*:drupal:*:*"
] | null | null | null | 3.5 | null |
|
RHSA-2007:0155
|
Red Hat Security Advisory: php security update
|
gd: buffer overrun security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2025-21523
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
GHSA-6mgc-769f-wwgg
|
Bloginator 1A allows remote attackers to bypass authentication and gain administrative access by setting the identifyYourself cookie.
|
[] | null | null | null | null | null |
|
GHSA-f496-vgq6-3hm4
|
On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.
|
[] | null | null | 8.6 | null | null |
|
CVE-2007-0846
|
Cross-site scripting (XSS) vulnerability in forum.php in Open Tibia Server CMS (OTSCMS) 2.1.5 and earlier allows remote attackers to inject arbitrary HTML or web script via the name parameter.
|
[
"cpe:2.3:a:open_tibia_server_cms:open_tibia_server_cms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open_tibia_server_cms:open_tibia_server_cms:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:open_tibia_server_cms:open_tibia_server_cms:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:open_tibia_server_cms:open_tibia_server_cms:2.1.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2021-34853
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14013.
|
[
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-9xv2-96hv-wjc8
|
LifeType 1.0.x and 1.1.x have insufficient access control for all of the PHP scripts under (1) class/ and (2) plugins/, which allows remote attackers to obtain the installation path via a direct request to any of the scripts, as demonstrated by (a) bayesianfilter.class.php and (b) bootstrap.php, which leaks the path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-8j8c-7jfh-h6hx
|
Code Injection in js-yaml
|
Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected.An example payload is
`{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1`
which returns the object
{
"1553107949161": 1
}RecommendationUpgrade to version 3.13.1.
|
[] | null | null | null | null | null |
GHSA-pg57-jx9m-63x8
|
Vulnerability in the Oracle Incentive Compensation product of Oracle E-Business Suite (component: Compensation Plan). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Incentive Compensation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Incentive Compensation accessible data as well as unauthorized access to critical data or complete access to all Oracle Incentive Compensation accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | 8.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.