id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-p294-p2wv-22g4
|
The Wordfence Security – Firewall & Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insufficient escaping on the stored value. This makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts into the setting that executes whenever a user accesses a page displaying the affected setting on sites running a vulnerable version.
|
[] | null | 4.8 | null | null | null |
|
GHSA-v6r4-6v6m-8669
|
Memory corruption while invoking the SubmitCommands call on Gfx engine during the graphics render.
|
[] | null | 8.4 | null | null | null |
|
CVE-2018-4433
|
A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, watchOS 5, iOS 12, tvOS 12, macOS Mojave 10.14. A malicious application may be able to modify protected parts of the file system.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-7wg5-5h5v-v89m
|
Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client.
|
[] | null | 5.2 | null | null | null |
|
GHSA-4xc9-f69v-j9v2
|
mt-comments.cgi in Movable Type before 3.2 allows attackers to redirect users to other web sites via URLs in comments.
|
[] | null | null | null | null | null |
|
GHSA-wm48-77p5-c96q
|
apmscript in Apmd in Red Hat 7.2 "Enigma" allows local users to create or change the modification dates of arbitrary files via a symlink attack on the LOW_POWER temporary file, which could be used to cause a denial of service, e.g. by creating /etc/nologin and disabling logins.
|
[] | null | null | null | null | null |
|
CVE-2024-5008
|
WhatsUp Gold APM Unrestricted File Upload Remote Code Execution Vulnerability
|
In WhatsUp Gold versions released before 2023.1.3,
an authenticated user with certain permissions can upload an arbitrary file and obtain RCE using Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController.
|
[
"cpe:2.3:a:progress:whatsup_gold:2023.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2023-25719
|
ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).
|
[
"cpe:2.3:a:connectwise:control:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-38fh-5rpq-pxq2
|
Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
|
[] | null | null | null | null | null |
|
CVE-2013-4270
|
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*"
] | null | null | null | 3.6 | null |
|
CVE-2010-0879
|
Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.49.26 and 8.50.07 allows remote authenticated users to affect confidentiality via unknown vectors.
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.49.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.50.07:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.49.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.50.07:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
ICSA-23-012-10
|
Siemens Automation License Manager
|
The affected components allow to rename license files with user chosen input without authentication.
This could allow an unauthenticated remote attacker to rename and move files as SYSTEM user. The affected component does not correctly validate the root path on folder related operations, allowing to modify files and folders outside the intended root directory.
This could allow an unauthenticated remote attacker to execute file operations of files outside of the specified root folder. Chained with CVE-2022-43513 this could allow Remote Code Execution.
|
[] | null | 7.7 | null | null | null |
CVE-2020-14717
|
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Common Applications accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
|
[
"cpe:2.3:a:oracle:common_applications:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:common_applications:12.1.3:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
|
GHSA-2cgw-c87g-ww8q
|
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
|
[] | null | 7.4 | null | null | null |
|
GHSA-vc9x-q8pm-49vv
|
SQL injection vulnerability in main_bigware_53.tpl.php in Bigware Shop 2.0 allows remote attackers to execute arbitrary SQL commands via the pollid parameter in a results action to main_bigware_53.php.
|
[] | null | null | null | null | null |
|
GHSA-j54r-w587-95q7
|
Jenkins Oracle Cloud Infrastructure Compute Plugin missing SSH host key validation
|
Jenkins Oracle Cloud Infrastructure Compute Plugin 1.0.16 and earlier does not perform SSH host key validation when connecting to OCI clouds.This lack of validation could be abused using a man-in-the-middle attack to intercept these connections to OCI clouds.Oracle Cloud Infrastructure Compute Plugin 1.0.17 provides strategies for performing host key validation for administrators to select the one that meets their security needs.
|
[] | null | 4.8 | null | null | null |
CVE-2016-7167
|
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
|
[
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2023-37576
|
Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2vzt conversion utility.
|
[
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2016-0643
|
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 4 | null |
|
CVE-2019-17325
|
ClipSoft REXPERT 1.0.0.527 and earlier version allows remote attacker to upload arbitrary local file via the ActiveX method in RexViewerCtrl30.ocx. That could lead to disclosure of sensitive information. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.
|
[
"cpe:2.3:a:clipsoft:rexpert:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2018-3929
|
An exploitable heap corruption exists in the PowerPoint document conversion functionality of the Antenna House Office Server Document Converter version V6.1 Pro MR2 for Linux64 (6,1,2018,0312). A crafted PowerPoint (PPT) document can lead to heap corruption, resulting in remote code execution.
|
[
"cpe:2.3:a:antennahouse:office_server_document_converter:6.1:mr2:*:*:pro:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2012-5609
|
Incomplete blacklist vulnerability in lib/migrate.php in ownCloud before 4.5.2 allows remote authenticated users to execute arbitrary PHP code by uploading a crafted mount.php file in a ZIP file.
|
[
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2007-0627
|
Michael Still gtalkbot before 1.2 places username and password arguments on the command line, which allows local users to obtain sensitive information by listing the process.
|
[
"cpe:2.3:a:michael_still:gtalkbot:*:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-wfj7-wfff-wmrg
|
A Cross-Site Scripting (XSS) was discovered in GamePanelX-V3 3.0.12. The vulnerability exists due to insufficient filtration of user-supplied data (a) passed to the "GamePanelX-V3-master/ajax/ajax.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
|
[] | null | null | 6.1 | null | null |
|
CVE-2009-0147
|
Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
|
[
"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-16550
|
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
|
[
"cpe:2.3:a:jenkins:maven:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-g2hw-cwx5-h2xx
|
An exploitable overly permissive cross-domain (CORS) whitelist vulnerability exists in JSON-RPC of Parity Ethereum client version 1.7.8. An automatically sent JSON object to JSON-RPC endpoint can trigger this vulnerability. A victim needs to visit a malicious website to trigger this vulnerability.
|
[] | null | null | 7.5 | null | null |
|
GHSA-w58x-5ghh-784p
|
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
|
[] | null | null | null | null | null |
|
CVE-2023-51462
|
Adobe Experience Manager | Cross-site Scripting (Reflected XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2023-40038
|
Arris DG860A and DG1670A devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. (They use the first 6 characters of the SSID and the last 6 characters of the BSSID, decrementing the last digit.)
|
[
"cpe:2.3:o:arris:dg860a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arris:dg860a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arris:dg1670a_firmware:ts0901203b6_020420_16xx.gw_pc20_tw:*:*:*:*:*:*:*",
"cpe:2.3:h:arris:dg1670a:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-4c72-3jr9-g459
|
SQL injection vulnerability in the Certificate Authority Proxy Function (CAPF) implementation in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows remote attackers to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCum46483.
|
[] | null | null | null | null | null |
|
CVE-2025-8571
|
Concrete CMS 9 through 9.4.2 and below 8.5.21 is vulnerable to Reflected Cross-Site Scripting (XSS) in Conversation Messages Dashboard Page
|
Concrete CMS 9 to 9.4.2 and versions below 8.5.21 are vulnerable to Reflected Cross-Site Scripting (XSS) in the Conversation Messages Dashboard Page. Unsanitized input could cause theft of session cookies or tokens, defacement of web content, redirection to malicious sites, and (if victim is an admin), the execution of unauthorized actions. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Fortbridge https://fortbridge.co.uk/ for performing a penetration test and vulnerability assessment on Concrete CMS and reporting this issue.
|
[] | 4.8 | null | null | null | null |
CVE-2021-34524
|
Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
|
Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*",
"cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2022-38466
|
A vulnerability has been identified in CoreShield One-Way Gateway (OWG) Software (All versions < V2.2). The default installation sets insecure file permissions that could allow a local attacker to escalate privileges to local administrator.
|
[
"cpe:2.3:a:siemens:coreshield_one-way_gateway:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
RHSA-2023:0542
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update
|
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters kiali: error message spoofing in kiali UI golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service Istio: Denial of service attack via a specially crafted message golang: regexp/syntax: limit memory used by parsing regexps
|
[
"cpe:/a:redhat:service_mesh:2.3::el8"
] | null | 6.5 | null | null | null |
GHSA-jpg6-qmvf-wrj2
|
Intel Graphics Driver in Apple OS X before 10.11.5 allows attackers to obtain sensitive kernel memory-layout information via a crafted app, a different vulnerability than CVE-2016-1860.
|
[] | null | null | 3.3 | null | null |
|
GHSA-57j9-569f-rrxf
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound G Web Pro Store Locator allows Reflected XSS. This issue affects G Web Pro Store Locator: from n/a through 2.0.1.
|
[] | null | 7.1 | null | null | null |
|
GHSA-rpmc-7fj9-hff3
|
CUPS in Mac OS X 10.3.9 and 10.4.2 allows remote attackers to cause a denial of service (CPU consumption) by sending a partial IPP request and closing the connection.
|
[] | null | null | null | null | null |
|
GHSA-82pv-x3j7-8x3m
|
Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allow an information disclosure vulnerability due to how URL redirects are handled, aka "Microsoft Exchange Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0941.
|
[] | null | null | 6.5 | null | null |
|
GHSA-v7h6-whhr-jv6v
|
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2021:4687
|
Red Hat Security Advisory: kernel security update
|
kernel: insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver may allow an unauthenticated user to potentially enable DoS via adjacent access kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null | null |
GHSA-fff7-qc35-c5hv
|
Cross-site scripting (XSS) vulnerability in AWSguest.php in AllWebScripts MySQLGuest allows remote attackers to inject arbitrary HTML and PHP code via the (1) Name, (2) Email, (3) Homepage or (4) Comments field.
|
[] | null | null | null | null | null |
|
CVE-2018-7933
|
Huawei home gateway products HiRouter-CD20 and WS5200 with the versions before HiRouter-CD20-10 1.9.6 and the versions before WS5200-10 1.9.6 have a path traversal vulnerability. Due to the lack of validation while these home gateway products install APK plugins, an attacker tricks a user into installing a malicious APK plugin, and plugin can overwrite arbitrary file of devices. Successful exploit may result in arbitrary code execution or privilege escalation.
|
[
"cpe:2.3:o:huawei:hirouter-cd20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5200:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2008-4734
|
Cross-site request forgery (CSRF) vulnerability in the wpcr_do_options_page function in WP Comment Remix plugin before 1.4.4 for WordPress allows remote attackers to perform unauthorized actions as administrators via a request that sets the wpcr_hidden_form_input parameter.
|
[
"cpe:2.3:a:pressography:wp_comment_remix_plugin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pressography:wp_comment_remix_plugin:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-26799
|
Cross Site Scripting (XSS) vulnerability in admin/files/edit in Omeka Classic <=2.7 allows remote attackers to inject arbitrary web script or HTML.
|
[
"cpe:2.3:a:omeka:omeka:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2023-3936
|
Blog2Social < 7.2.1 - Reflected XSS
|
The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[
"cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-pc58-jh86-xjm9
|
Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).
|
[] | null | 2.7 | null | null | null |
|
RHSA-2023:4524
|
Red Hat Security Advisory: libcap security update
|
libcap: Memory Leak on pthread_create() Error libcap: Integer Overflow in _libcap_strdup()
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null | null |
GHSA-ph8m-2h2f-qgr2
|
An access bypass issue was found in Drupal 7.x before version 7.5. If a Drupal site has the ability to attach File upload fields to any entity type in the system or has the ability to point individual File upload fields to the private file directory in comments, and the parent node is denied access, non-privileged users can still download the file attached to the comment if they know or guess its direct URL.
|
[] | null | 7.5 | null | null | null |
|
GHSA-6vmf-4ghh-8g4r
|
Unspecified vulnerability in EMC Disk Library (EDL) before 3.2.7, 3.3.x before 3.3.2 epatch 8, and 4.0.x before 4.0.1 epatch 4 allows remote attackers to cause a denial of service (communication-module crash) by sending a crafted message through TCP.
|
[] | null | null | null | null | null |
|
GHSA-rv54-hf76-46cc
|
Potential null pointer dereference in KGSL GPU auxiliary command due to improper validation of user input in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
|
[] | null | null | null | null | null |
|
GHSA-rw4h-rxmp-j7hg
|
Improper Authentication vulnerability in BUDDYBOSS DMCC BuddyBoss Theme allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects BuddyBoss Theme: from n/a through 2.4.60.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-41813
|
txtdot SSRF vulnerability in /proxy
|
txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Starting in version 1.4.0 and prior to version 1.6.1, a Server-Side Request Forgery (SSRF) vulnerability in the `/proxy` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.6.1 patches the issue.
|
[
"cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-7j7c-fpxp-8wjc
|
SQL injection vulnerability in the Vote rank for news (vote_for_tt_news) extension 1.0.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-5857
|
Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2018-20800
|
An issue was discovered in Open Ticket Request System (OTRS) 5.0.31 and 6.0.13. Users updating to 6.0.13 (also patchlevel updates) or 5.0.31 (only major updates) will experience data loss in their agent preferences table.
|
[
"cpe:2.3:a:otrs:otrs:5.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:6.0.13:*:*:*:*:*:*:*"
] | null | null | 6.5 | 5.5 | null |
|
CVE-2021-0159
|
Improper input validation in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
|
[
"cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6208u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6226r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6242r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6246r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6248r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6250l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6256_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6258r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4210r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4210t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4214r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4215r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
RHSA-2025:0137
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null | null |
CVE-2024-49032
|
Microsoft Office Graphics Remote Code Execution Vulnerability
|
Microsoft Office Graphics Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*"
] | null | 7.8 | null | null | null |
GHSA-7cr6-g5pc-g6g4
|
The JBoss Application Server (WildFly) JacORB subsystem in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 does not properly assign socket-binding-ref sensitivity classification to the security-domain attribute, which allows remote authenticated users to obtain sensitive information by leveraging access to the security-domain attribute.
|
[] | null | null | null | null | null |
|
CVE-2011-0448
|
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
|
[
"cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2j76-52j5-65g4
|
Buffer overflow in the Apple Minimal SLP v2 Service Agent (slpd) in Mac OS X 10.4.11 and earlier, including 10.4.8, allows local users, and possibly remote attackers, to gain privileges and possibly execute arbitrary code via a registration request with an invalid attr-list field.
|
[] | null | null | null | null | null |
|
GHSA-c3qc-r5wf-4g62
|
The Cisco Video Surveillance Stream Manager firmware before 5.3, as used on Cisco Video Surveillance Services Platforms and Video Surveillance Integrated Services Platforms, allows remote attackers to cause a denial of service (reboot) via a malformed payload in a UDP packet to port 37000, related to the xvcrman process, aka Bug ID CSCsj47924.
|
[] | null | null | null | null | null |
|
CVE-2022-32882
|
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An app may be able to bypass Privacy preferences.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2018-18599
|
Stegdetect through 2018-05-26 has an out-of-bounds write in f5_compress in the f5.c file.
|
[
"cpe:2.3:a:guardianproject:stegdetect:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
RHSA-2008:0556
|
Red Hat Security Advisory: freetype security update
|
FreeType PFB integer overflow FreeType invalid free() flaw FreeType off-by-one flaws
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2016-10831
|
cPanel before 55.9999.141 does not perform as two-factor authentication check when possessing another account (SEC-101).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
CVE-2024-45862
|
Cleartext Storage of Sensitive Information in Kastle Systems Access Control System
|
Kastle Systems firmware prior to May 1, 2024, stored machine credentials in cleartext, which may allow an attacker to access sensitive information.
|
[
"cpe:2.3:o:kastlesystems:access_control_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:kastle:access_control_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:kastle:access_control_system:-:*:*:*:*:*:*:*"
] | 8.7 | null | null | null | null |
CVE-2023-29338
|
Visual Studio Code Spoofing Vulnerability
|
Visual Studio Code Spoofing Vulnerability
|
[
"cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
GHSA-6pcv-r3vc-xfcc
|
The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
|
[] | null | null | null | null | null |
|
GHSA-77p6-jjq7-fgjg
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[] | null | null | null | null | null |
|
GHSA-wg3r-h2gv-34fv
|
Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager
allows an authenticated user to gain unauthorized access to private personal information.Under specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.This issue affects the following versions :Remote Desktop Manager Windows 2025.1.34.0 and earlier
|
[] | null | 7.5 | null | null | null |
|
GHSA-hq4r-2rgj-rj48
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
|
[] | null | null | null | null | null |
|
CVE-2018-10593
|
A vulnerability in DB Manager version 3.0.1.0 and previous and PerformA version 3.0.0.0 and previous allows an authorized user with access to a privileged account on a BD Kiestra system (Kiestra TLA, Kiestra WCA, and InoqulA+ specimen processor) to issue SQL commands, which may result in data corruption.
|
[
"cpe:2.3:a:bd:database_manager:3.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bd:performa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bd:reada:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bd:inoqula\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bd:kiestra_tla:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bd:kiestra_wca:-:*:*:*:*:*:*:*"
] | null | null | 5.6 | 3.8 | null |
|
GHSA-33f3-88p6-j3f9
|
TOTOLINK A8000RU v7.1cu.643_B20200521 was discovered to contain a hardcoded password for root stored in /etc/shadow.
|
[] | null | 9.8 | null | null | null |
|
GHSA-j2w3-9x2h-3h37
|
The keystore file in Unicore Client before 5.6 build 5, when running on Unix systems, has insecure default permissions, which allows local users to obtain sensitive information.
|
[] | null | null | null | null | null |
|
CVE-2008-5767
|
SQL injection vulnerability in authors.asp in gNews Publisher allows remote attackers to execute arbitrary SQL commands via the authorID parameter.
|
[
"cpe:2.3:a:gazatem:gnews_publisher:_nil_:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2015-6403
|
The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400.
|
[
"cpe:2.3:o:cisco:spa500_firmware:7.5.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_500ds:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_500s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_501g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_502g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_504g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_508g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_509g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_512g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_514g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_525g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa300_firmware:7.5.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_301:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa_303:-:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-w4fw-r8m4-v5qv
|
A vulnerability has been found in Activity Log Plugin and classified as critical. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213448.
|
[] | null | 9.8 | null | null | null |
|
GHSA-rmp2-2fph-gg5p
|
Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector
|
[] | null | 7.4 | null | null | null |
|
GHSA-3r9p-rc57-36hr
|
The Under Construction / Maintenance Mode from Acurax plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.6 via the 'acx_csma_subscribe_ajax' function. This can allow authenticated attackers to extract sensitive data such as names and email addresses of subscribed visitors.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2022:7409
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 7
|
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 7.5 | null | null | null |
CVE-2021-0273
|
Junos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces.
|
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to exploit an interdependency in the PFE UCODE microcode of the Trio chipset with various line cards to cause packets destined to the devices interfaces to cause a Denial of Service (DoS) condition by looping the packet with an unreachable exit condition ('Infinite Loop'). To break this loop once it begins one side of the affected LT interfaces will need to be disabled. Once disabled, the condition will clear and the disabled LT interface can be reenabled. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue only affects LT-LT interfaces. Any other interfaces are not affected by this issue. This issue affects the following cards: MPCE Type 3 3D MPC4E 3D 32XGE MPC4E 3D 2CGE+8XGE EX9200 32x10G SFP EX9200-2C-8XS FPC Type 5-3D FPC Type 5-LSR EX9200 4x40G QSFP An Indicator of Compromise (IoC) can be seen by examining the traffic of the LT-LT interfaces for excessive traffic using the following command: monitor interface traffic Before loop impact: Interface: lt-2/0/0, Enabled, Link is Up Encapsulation: Logical-tunnel, Speed: 100000mbps Traffic statistics: Current delta Input bytes: 3759900268942 (1456 bps) [0] <---------- LT interface utilization is low Output bytes: 3759900344309 (1456 bps) [0] <---------- LT interface utilization is low After loop impact: Interface: lt-2/0/0, Enabled, Link is Up Encapsulation: Logical-tunnel, Speed: 100000mbps Traffic statistics: Current delta Input bytes: 3765160313129 (2158268368 bps) [5260044187] <---------- LT interface utilization is very high Output bytes: 3765160399522 (2158266440 bps) [5260055213] <---------- LT interface utilization is very high This issue affects: Juniper Networks Junos OS on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960. Versions 15.1F6, 16.1R1, and later versions prior to 16.1R7-S8; 17.1 versions prior to 17.1R2-S12; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S10, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R1-S7, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S4, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S1, 19.4R2. This issue does not affect the MX10001. This issue does not affect Juniper Networks Junos OS versions prior to 15.1F6, 16.1R1. Juniper Networks Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 19.4 versions prior to 19.4R2-EVO. This issue does not affect the MX10001.
|
[
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-j444-7j4h-86hv
|
Missing Authorization vulnerability in Stamped.io Stamped.io Product Reviews & UGC for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stamped.io Product Reviews & UGC for WooCommerce: from n/a through 2.3.2.
|
[] | null | 5.3 | null | null | null |
|
CVE-2013-1285
|
The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287.
|
[
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2007-3884
|
SQL injection vulnerability in philboard_forum.asp in husrevforum 1.0.1 allows remote attackers to execute arbitrary SQL commands via the forumid parameter. NOTE: it was later reported that 2.0.1 is also affected.
|
[
"cpe:2.3:a:aspindir:husrevforum:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:aspindir:husrevforum:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-27855
|
WordPress Analytics Cat plugin <= 1.0.9 - Plugin Settings change via Cross-Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Fatcat Apps Analytics Cat plugin <= 1.0.9 on WordPress allows Plugin Settings Change.
|
[
"cpe:2.3:a:fatcatapps:analytics_cat:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2024-35919
|
media: mediatek: vcodec: adding lock to protect encoder context list
|
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: adding lock to protect encoder context list
Add a lock for the ctx_list, to avoid accessing a NULL pointer
within the 'vpu_enc_ipi_handler' function when the ctx_list has
been deleted due to an unexpected behavior on the SCP IP block.
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
CVE-2012-1732
|
Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to UI Framework, a different vulnerability than CVE-2012-1754.
|
[
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-23cg-4fwx-fhrv
|
Arbitrary file deletion vulnerability was discovered in wuzhicms v 4.0.1 via coreframe\app\attachment\admin\index.php, which allows attackers to access sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-gc8m-99qv-67w4
|
In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 or Enterprise Manager 3.1.1, malformed requests to the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, may lead to disruption of TMUI services. This attack requires an authenticated user with any role (other than the No Access role). The No Access user role cannot login and does not have the access level to perform the attack.
|
[] | null | null | 4.3 | null | null |
|
CVE-2017-8218
|
vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.
|
[
"cpe:2.3:o:tp-link:c2_firmware:*:rel.37961n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:c2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:c20i_firmware:*:rel.37961n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:c20i:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-gjmr-rw74-6fvm
|
Sandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files.
|
[] | null | null | null | null | null |
|
CVE-2024-31552
|
CuteHttpFileServer v.3.1 version has an arbitrary file download vulnerability, which allows attackers to download arbitrary files on the server and obtain sensitive information.
|
[
"cpe:2.3:a:cutehttpfileserver:cutehttpfileserver:3.1:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
RHSA-2019:0458
|
Red Hat Security Advisory: vdsm security and bug fix update
|
vdsm: privilege escalation to root via systemd_run
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.4 | null | null |
CVE-2022-2606
|
Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-30107
|
HCL Connections is vulnerable to broken access control
|
HCL Connections contains a broken access control vulnerability that may expose sensitive information to unauthorized users in certain scenarios.
|
[
"cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
GHSA-m5wp-9jw2-r9vp
|
Immuta v2.8.2 is affected by one instance of insecure permissions that can lead to user account takeover.
|
[] | null | null | null | null | null |
|
CVE-2023-24180
|
Libelfin v0.3 was discovered to contain an integer overflow in the load function at elf/mmap_loader.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted elf file.
|
[
"cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-rqph-98jh-44jj
|
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8596, CVE-2017-8595, CVE-2017-8618, CVE-2017-8619, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
|
[] | null | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.