id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2021-45617
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX7500 before 1.0.0.72, R6400 before 1.0.1.68, R6900P before 1.3.2.132, R7000 before 1.0.11.116, R7000P before 1.3.2.132, R7900 before 1.0.4.38, R7960P before 1.4.1.66, R8000 before 1.0.4.66, RAX200 before 1.0.3.106, RS400 before 1.5.1.80, XR300 before 1.0.3.68, MK62 before 1.0.6.110, MR60 before 1.0.6.110, R6400v2 before 1.0.4.106, R8000P before 1.4.1.66, RAX20 before 1.0.2.64, RAX45 before 1.0.2.82, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, R6700v3 before 1.0.4.106, R7900P before 1.4.1.66, RAX15 before 1.0.2.64, RAX50 before 1.0.2.82, RAX75 before 1.0.3.106, RBR750 before 3.2.16.22, RBR850 before 3.2.16.22, RBS750 before 3.2.16.22, RBS850 before 3.2.16.22, RBK752 before 3.2.16.22, and RBK852 before 3.2.16.22.
|
[
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-59vw-wx25-6mxm
|
Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
GHSA-vfj8-5pj7-2f9g
|
OpenC3 Cross-site Scripting in Login functionality (`GHSL-2024-128`)
|
SummaryThe login functionality contains a reflected cross-site scripting (XSS) vulnerability.Note: This CVE only affects Open Source Edition, and not OpenC3 COSMOS Enterprise EditionImpactThis issue may lead up to Remote Code Execution (RCE).
|
[] | 5.1 | 6.1 | null | null | null |
CVE-2022-41191
|
Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
|
[
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-jmrg-64rf-qpwj
|
The Sunshine Photo Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.28 This is due to missing or incorrect nonce validation on the sunshine_products_quicksave_post() function. This makes it possible for unauthenticated attackers to save custom post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
CVE-2022-2852
|
Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-22705
|
WordPress Welcart e-Commerce Plugin <= 2.8.10 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Collne Inc. Welcart e-Commerce plugin <= 2.8.10 versions.
|
[
"cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
GHSA-4qrp-r28g-j2vf
|
A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition.This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.
|
[] | null | 8.6 | null | null | null |
|
CVE-2023-37210
|
A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
RHSA-2021:4408
|
Red Hat Security Advisory: libsolv security and bug fix update
|
libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.3 | null | null | null |
GHSA-75j9-xw79-qxqv
|
When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-6939
|
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause denial of service.
|
[
"cpe:2.3:o:hihonor:magic_ui:*:*:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
RHSA-2025:10875
|
Red Hat Security Advisory: OpenJDK 21.0.8 Security Update for Windows Builds
|
openjdk: Better Glyph drawing (Oracle CPU 2025-07) openjdk: Enhance TLS protocol support (Oracle CPU 2025-07) openjdk: Improve HTTP client header handling (Oracle CPU 2025-07) openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
|
[
"cpe:/a:redhat:openjdk:21"
] | null | 8.1 | null | null | null |
GHSA-3m65-86mg-45wp
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16171.
|
[] | null | 7.8 | null | null | null |
|
GHSA-8x8p-mfwv-9fjw
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor vulnerability
|
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/READ permission to obtain the default value for the password field of a parameterized job by reading the DOM.
|
[] | null | null | null | null | null |
GHSA-2vrc-ghfq-ww6x
|
Out-of-bounds write in accessing buffer storing the decoded video frames in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. User interaction is required for triggering this vulnerability.
|
[] | null | 7 | null | null | null |
|
GHSA-rqph-qm8x-qrrf
|
When the app is put to the background and the user goes to the task switcher of iOS, the app snapshot is not blurred which may reveal sensitive information.
|
[] | null | 3.3 | null | null | null |
|
GHSA-qw5g-qccp-wchw
|
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-0381
|
Embed Swagger <= 1.0.0 Reflected Cross-Site Scripting
|
The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0.
|
[
"cpe:2.3:a:embed_swagger_project:embed_swagger:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2022-33870
|
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
|
[
"cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
RHSA-2024:1649
|
Red Hat Security Advisory: postgresql-jdbc: security update
|
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 9.8 | null | null | null |
CVE-2024-40689
|
IBM InfoSphere Information Server SQL injection
|
IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. IBM X-Force ID: 297719.
|
[
"cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*"
] | null | 6 | null | null | null |
CVE-2021-22452
|
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address.
|
[
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
GHSA-qmwq-g6wj-vpwj
|
Unspecified vulnerability in HP Service Manager WebTier and Windows Client 9.20 and 9.21 before 9.21.661 p8 allows remote authenticated users to execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2019-7628
|
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)
|
[
"cpe:2.3:a:redhat:pagure:5.2:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2024-27525
|
Cross Site Scripting vulnerability in Chamilo LMS v.1.11.26 allows a remote attacker to escalate privileges via a crafted script to the filename parameter of the home.php component.
|
[
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
|
CVE-2025-6633
|
RBG File Parsing Out-of-Bounds Write Vulnerability
|
A maliciously crafted RBG file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
|
[
"cpe:2.3:a:autodesk:3ds_max:2026.2:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-gx25-vx95-m52w
|
Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1.
|
[] | null | 9.8 | null | null | null |
|
GHSA-c8pj-5cqm-hgg7
|
A vulnerability classified as critical has been found in DedeCMS 5.7.111. Affected is an unknown function of the file baidunews.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240948.
|
[] | null | null | 6.3 | null | null |
|
CVE-2020-1497
|
Microsoft Excel Information Disclosure Vulnerability
|
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data.
To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created.
The update addresses the vulnerability by changing the way certain Excel functions handle objects in memory.
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*"
] | null | 5.5 | null | 4.3 | null |
CVE-2015-0601
|
Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier allow local users to cause a denial of service (device reload) via crafted commands, aka Bug ID CSCup92790.
|
[
"cpe:2.3:o:cisco:unified_ip_phones_9971_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_9971:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phones_9951_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_9951:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-2cj9-r6h5-6jwg
|
ServerDocs Server in Apple OS X Server before 5.2 supports the RC4 cipher, which might allow remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
|
[] | null | null | 7.5 | null | null |
|
GHSA-22rq-8f3w-579w
|
The Samsung J7 Neo Android device with a build fingerprint of samsung/j7velteub/j7velte:8.1.0/M1AJQ/J701MUBS6BSB4:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
|
[] | null | null | null | null | null |
|
CVE-2011-5056
|
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024.
|
[
"cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-8xqw-f37j-96v8
|
Protection mechanism failure in the Intel(R) Ethernet 500 Series Controller drivers for VMware before version 1.10.0.13 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2020:3194
|
Red Hat Security Advisory: Container-native Virtualization security, bug fix, and enhancement update
|
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters kubevirt: VMIs can be used to access host files
|
[
"cpe:/a:redhat:container_native_virtualization:2.4::el8"
] | null | 9.9 | null | null | null |
GHSA-9wv2-mrrp-v8g7
|
RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.
|
[] | null | 5.6 | null | null | null |
|
CVE-2015-0363
|
Unspecified vulnerability in the Siebel Core EAI component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect availability via unknown vectors related to Integration Business Services.
|
[
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2014-8639
|
Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
|
[
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-28j3-x77x-9653
|
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsHijack function.
|
[] | null | 9.8 | null | null | null |
|
CVE-2009-2035
|
Unspecified vulnerability in Services 6.x before 6.x-0.14, a module for Drupal, when key-based access is enabled, allows remote attackers to read or add keys and access unauthorized services via unspecified vectors.
|
[
"cpe:2.3:a:drupal:services_module_for_drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:services_module_for_drupal:6.x-0.12:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-q788-3q72-cgx4
|
Teamtek Universal FTP Server 1.0.50 allows remote attackers to cause a denial of service (daemon crash or hang) via (1) multiple STOR (aka PUT) commands, or an MKD command followed by (2) a '*' argument, (3) a '|' argument, (4) spaces, or (5) a long string. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-9j82-qgpc-g3mq
|
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2024:3781
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
pip: Mercurial configuration injectable in repo revision when installing via pip golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm python-cryptography: NULL-dereference when loading PKCS7 certificates pillow: Arbitrary Code Execution via the environment parameter python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() python-pydantic: regular expression denial of service via crafted email string sqlparse: parsing heavily nested list leads to denial of service psf/black: ReDoS via the lines_with_leading_tabs_expanded() function in strings.py file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override aiohttp: XSS on index pages for static file handling python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() python-pillow: buffer overflow in _imagingcms.c follow-redirects: Possible credential leak aiohttp: DoS when trying to parse malformed POST requests python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django jinja2: accepts keys containing non-attribute characters requests: subsequent requests to the same host ignore cert verification
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 5.6 | 7.5 | null | null |
GHSA-4xcq-vmqm-999q
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kienso Co-marquage service-public.Fr allows Reflected XSS.This issue affects Co-marquage service-public.Fr: from n/a through 0.5.72.
|
[] | null | 7.1 | null | null | null |
|
GHSA-6hq3-f3rw-pvjc
|
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
|
[] | null | 7.5 | null | null | null |
|
cisco-sa-20190904-unified-ccx-ssrf
|
Cisco Unified Contact Center Express Request Processing Server-Side Request Forgery Vulnerability
|
A vulnerability in Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system.
The vulnerability is due to improper validation of user-supplied input on the affected system. An attacker could exploit this vulnerability by sending the user of the web application a crafted request. If the request is processed, the attacker could access the system and perform unauthorized actions.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-unified-ccx-ssrf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-unified-ccx-ssrf"]
|
[] | null | null | 5.3 | null | null |
CVE-2024-0417
|
DeShang DSShop MemberAuth.php path traversal
|
A vulnerability, which was classified as critical, was found in DeShang DSShop up to 2.1.5. This affects an unknown part of the file application/home/controller/MemberAuth.php. The manipulation of the argument member_info leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250437 was assigned to this vulnerability.
|
[
"cpe:2.3:a:csdeshang:dsshop:*:*:*:*:*:*:*:*"
] | null | 5.4 | 5.4 | 5.5 | null |
GHSA-hrfh-7j5f-8ccr
|
Pivotal RabbitMQ is vulnerable to a denial of service attack
|
Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
|
[] | null | 7.5 | null | null | null |
GHSA-gv6j-2v3m-7374
|
StarTrinity Softswitch version 2023-02-16 - Multiple Reflected XSS (CWE-79)
|
[] | null | 8.8 | null | null | null |
|
GHSA-x2wx-h55f-89c3
|
An issue was discovered in DonLinkage 6.6.8. It allows remote attackers to obtain potentially sensitive information via a direct request for files/temporary.txt.
|
[] | null | null | 5.4 | null | null |
|
GHSA-q9mg-7cq7-w5cm
|
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2013-2784
|
Triangle Research International (aka Tri) Nano-10 PLC devices with firmware before r81 use an incorrect algorithm for bounds checking of data in Modbus/TCP packets, which allows remote attackers to cause a denial of service (networking outage) via a crafted packet to TCP port 502.
|
[
"cpe:2.3:o:triplc:nano-10_plc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:triplc:nano-10_plc:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-9f3p-cpj2-496g
|
Stack-based buffer overflow in the FindConfigChildeKeyList method in the XNSSDKDEVICE.XnsSdkDeviceCtrlForIpInstaller.1 ActiveX control in Samsung iPOLiS Device Manager before 1.8.7 allows remote attackers to execute arbitrary code via a long value.
|
[] | null | null | null | null | null |
|
CVE-2023-2076
|
Campcodes Online Traffic Offense Management System Users.phpp cross site scripting
|
A vulnerability classified as problematic was found in Campcodes Online Traffic Offense Management System 1.0. This vulnerability affects unknown code of the file /classes/Users.phpp. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226054 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:online_traffic_offense_management_system_project:online_traffic_offense_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
GHSA-hw28-2wwc-xj8m
|
ActiveX Control in MyBuilder before 6.2.2019.814 allow an attacker to execute arbitrary command via the ShellOpen method. This can be leveraged for code execution
|
[] | null | 9.8 | null | null | null |
|
GHSA-xwjf-v823-v896
|
drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
|
[] | null | null | null | null | null |
|
CVE-2014-8079
|
Cross-site scripting (XSS) vulnerability in the MAYO theme 7.x-1.x before 7.x-1.3 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via vectors related to header background setting.
|
[
"cpe:2.3:a:drupal:mayo:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:mayo:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:mayo:7.x-1.x-dev:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-7w8v-5fcq-pvqw
|
Apache Shenyu Server Side Request Forgery vulnerability
|
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the `/sandbox/proxyGateway` endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter.Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing.This issue affects Apache ShenYu: 2.5.1.Upgrade to Apache ShenYu 2.6.0 or apply patch https://github.com/apache/shenyu/pull/4776 .
|
[] | null | 6.5 | null | null | null |
RHSA-2015:0074
|
Red Hat Security Advisory: jasper security update
|
jasper: dec->numtiles off-by-one check in jpc_dec_process_sot() (oCERT-2015-001) jasper: unrestricted stack memory use in jpc_qmfb.c (oCERT-2015-001)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
CVE-2015-0204
|
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-x2m8-38gf-mf66
|
Infopop UBB.Threads before 6.5.2 Beta allows remote attackers to include arbitrary files via the language parameter in a cookie followed by a null (%00) byte.
|
[] | null | null | null | null | null |
|
CVE-2018-2488
|
It is possible for a malware application installed on an Android device to send local push notifications with an empty message to SAP Fiori Client and cause the application to crash. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
|
[
"cpe:2.3:a:sap:fiori_client:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2025-37768
|
drm/amd/pm: Prevent division by zero
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
|
[] | null | null | null | null | null |
CVE-2023-32646
|
Uncontrolled search path element in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-h68m-73wg-339q
|
SQL injection vulnerability in index.php in IceBB 1.0-rc9.3 and earlier allows remote attackers to execute arbitrary SQL commands via the skin parameter, probably related to an incorrect protection mechanism in the clean_string function in includes/functions.php.
|
[] | null | null | null | null | null |
|
CVE-2017-1622
|
IBM QRadar SIEM 7.2.8 and 7.3 does not validate, or incorrectly validates, a certificate. This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-force ID: 133120.
|
[
"cpe:2.3:a:ibm:qradar_incident_forensics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p11:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p12:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p13:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p6:*:*:*:*:*:*"
] | null | null | 3.7 | null | null |
|
GHSA-mhq7-m27c-9qjm
|
Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.
|
[] | null | 5.3 | null | null | null |
|
CVE-2015-0105
|
Cross-site scripting (XSS) vulnerability in the Process Portal in IBM Business Process Manager (BPM) 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 through 8.5.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-xxpc-j5ph-gmp8
|
There is a command injection vulnerability in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-44062
|
WordPress Custom Field Template plugin <= 2.6.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.6.5.
|
[
"cpe:2.3:a:wpgogo:custom_field_template:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2024-28046
|
Uncontrolled search path in some Intel(R) GPA software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:graphics_performance_analyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:graphics_performance_analyzers:*:*:*:*:*:*:*:*"
] | 5.4 | 6.7 | null | null | null |
|
CVE-2019-19229
|
admincgi-bin/service.fcgi on Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allows action=download&filename= Directory Traversal.
|
[
"cpe:2.3:o:fronius:datamanager_box_2.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:datamanager_box_2.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:eco_25.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:eco_25.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:eco_27.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:eco_27.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_1.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_1.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_1.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_1.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.1-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.1-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.1-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.1-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_10.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_10.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_11.4-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_11.4-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_12.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_12.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_15.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_15.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.6-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.6-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.8-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.8-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_4.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_4.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_4.6-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_4.6-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_aus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_aus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_sc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_6.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_6.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_6.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_6.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_7.6-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_7.6-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_8.2-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_8.2-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_8.2-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_8.2-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3-m-os_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3-m-os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.5-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.5-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3_107_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3_107:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_17.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_17.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_17.5-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_17.5-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_20.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_20.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_20.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_20.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_22.7-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_22.7-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_24.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_24.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.7-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.7-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.7-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.7-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_4.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_4.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_4.5-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_4.5-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_5.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_5.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_6.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_6.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_7.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_7.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_8.2-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_8.2-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_10.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_12.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_15.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_15.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_20.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_20.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_22.7-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_22.7-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_24.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_24.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_3.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_3.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_4.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_4.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_5.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_5.0-3-m:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2019-5809
|
Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2024-28001
|
WordPress Favicon Rotator plugin <= 1.2.10 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Archetyped Favicon Rotator allows Reflected XSS.This issue affects Favicon Rotator: from n/a through 1.2.10.
|
[] | null | 7.1 | null | null | null |
cisco-sa-prime-info-disc-nTU9FJ2
|
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Information Disclosure Vulnerability
|
A vulnerability in the CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, local attacker to access sensitive information stored on the underlying file system of an affected system.
This vulnerability exists because sensitive information is not sufficiently secured when it is stored. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.5 | null | null | null |
GHSA-grxv-g75f-w57w
|
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.
|
[] | null | null | null | null | null |
|
CVE-2009-1231
|
Unspecified vulnerability in the eClient in IBM DB2 Content Manager 8.4.1 before 8.4.1.1 has unknown impact and attack vectors.
|
[
"cpe:2.3:a:ibm:db2_content_manager:8.4.1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-2c3h-v9r3-w28r
|
index.php in Rhadrix If-CMS, possibly 1.01 and 2.07, allows remote attackers to obtain the full path of the web server via empty (1) rns[] or (2) pag[] arguments, which reveals the path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-ch2p-249c-2vf6
|
Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters.
|
[] | null | null | null | null | null |
|
RHSA-2012:1605
|
Red Hat Security Advisory: Fuse MQ Enterprise 7.1.0 update
|
jetty: hash table collisions CPU usage DoS (oCERT-2011-003)
|
[
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null | null |
RHSA-2010:0787
|
Red Hat Security Advisory: glibc security update
|
glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-4x2j-vmv4-3qc3
|
The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun36525.
|
[] | null | null | null | null | null |
|
CVE-2023-25121
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable.
|
[
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-qrxg-rv92-28fv
|
The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting
|
[] | null | null | null | null | null |
|
CVE-2020-12858
|
Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons.
|
[
"cpe:2.3:a:health:covidsafe:*:*:*:*:*:android:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2023-50829
|
WordPress Loan Repayment Calculator and Application Form Plugin <= 2.9.3 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aerin Loan Repayment Calculator and Application Form allows Stored XSS.This issue affects Loan Repayment Calculator and Application Form: from n/a through 2.9.3.
|
[
"cpe:2.3:a:quick-plugins:loan_repayment_calculator_and_application_form:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2021-47363
|
nexthop: Fix division by zero while replacing a resilient group
|
In the Linux kernel, the following vulnerability has been resolved:
nexthop: Fix division by zero while replacing a resilient group
The resilient nexthop group torture tests in fib_nexthop.sh exposed a
possible division by zero while replacing a resilient group [1]. The
division by zero occurs when the data path sees a resilient nexthop
group with zero buckets.
The tests replace a resilient nexthop group in a loop while traffic is
forwarded through it. The tests do not specify the number of buckets
while performing the replacement, resulting in the kernel allocating a
stub resilient table (i.e, 'struct nh_res_table') with zero buckets.
This table should never be visible to the data path, but the old nexthop
group (i.e., 'oldg') might still be used by the data path when the stub
table is assigned to it.
Fix this by only assigning the stub table to the old nexthop group after
making sure the group is no longer used by the data path.
Tested with fib_nexthops.sh:
Tests passed: 222
Tests failed: 0
[1]
divide error: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
RIP: 0010:nexthop_select_path+0x2d2/0x1a80
[...]
Call Trace:
fib_select_multipath+0x79b/0x1530
fib_select_path+0x8fb/0x1c10
ip_route_output_key_hash_rcu+0x1198/0x2da0
ip_route_output_key_hash+0x190/0x340
ip_route_output_flow+0x21/0x120
raw_sendmsg+0x91d/0x2e10
inet_sendmsg+0x9e/0xe0
__sys_sendto+0x23d/0x360
__x64_sys_sendto+0xe1/0x1b0
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xae
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-3c5p-cwqv-4mx2
|
When processing IE set command, buffer overwrite may occur due to lack of input validation of the IE length in Snapdragon Mobile in version SD 835, SD 845, SD 850.
|
[] | null | null | 7.8 | null | null |
|
CVE-2021-24489
|
Request a Quote < 2.3.9 - Admin+ Stored Cross-Site Scripting
|
The Request a Quote WordPress plugin before 2.3.9 does not sanitise, validate or escape some of its settings in the admin dashboard, leading to authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.
|
[
"cpe:2.3:a:emarketdesign:request_a_quote:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 | null |
CVE-2012-3286
|
Unspecified vulnerability in HP ArcSight Connector Appliance 6.3 and earlier and ArcSight Logger 5.2 and earlier allows remote authenticated users to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
|
[
"cpe:2.3:o:hp:arcsight_connector_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:arcsight_connector_appliance_firmware:6.0.0.60023.2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:arcsight_connector_appliance_firmware:6.2.0.6244.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_connector_appliance:c1400:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_connector_appliance:c3400:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_connector_appliance:c5400:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:arcsight_logger:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-wrq6-8pjf-94rp
|
Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
|
[] | null | null | null | null | null |
|
GHSA-gcrv-9fp9-jhxr
|
The keep-alive mechanism for Microsoft SQL Server 2000 allows remote attackers to cause a denial of service (bandwidth consumption) via a "ping" style packet to the Resolution Service (UDP port 1434) with a spoofed IP address of another SQL Server system, which causes the two servers to exchange packets in an infinite loop.
|
[] | null | null | null | null | null |
|
CVE-2024-5892
|
Divi Torque Lite – Divi Theme and Extra Theme <= 3.6.6 - Authenticated (Author+) Stored Cross-Site Scripting via SVG Upload
|
The Divi Torque Lite – Divi Theme and Extra Theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘support_unfiltered_files_upload’ function in all versions up to, and including, 3.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-7p59-xqgx-w7p8
|
Stack-based buffer overflow in McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows attackers to cause a denial of service (system crash) via a long vault GUID in an ioctl call.
|
[] | null | null | 7.5 | null | null |
|
CVE-2024-37816
|
Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack overflow.
|
[] | null | 4.2 | null | null | null |
|
GHSA-998p-xc25-r3jq
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: bnep: fix wild-memory-access in proto_unregisterThere's issue as follows:
KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]
CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G W
RIP: 0010:proto_unregister+0xee/0x400
Call Trace:
<TASK>
__do_sys_delete_module+0x318/0x580
do_syscall_64+0xc1/0x1d0
entry_SYSCALL_64_after_hwframe+0x77/0x7fAs bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()
will cleanup all resource. Then when remove bnep module will call
bnep_sock_cleanup() to cleanup sock's resource.
To solve above issue just return bnep_sock_init()'s return value in
bnep_exit().
|
[] | null | 5.5 | null | null | null |
|
GHSA-cqc3-wp4c-vrcw
|
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
CVE-2023-0799
|
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
|
[
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
GHSA-72h3-f956-8mcr
|
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[] | null | 7.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.