id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-7h3w-v9hh-hp55
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project.
|
[] | null | 9.6 | null | null | null |
|
GHSA-p9xp-4jv8-8r8f
|
Unspecified vulnerability in the JAX-WS client and service in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows remote attackers to access URLs or cause a denial of service via unknown vectors involving "processing of XML data" by a trusted application.
|
[] | null | null | null | null | null |
|
GHSA-p6g4-5hgj-p576
|
The Cost Calculator WordPress plugin before 1.6 allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the Description fields of a Cost Calculator > Price Settings (which gets injected on the edit page as well as any page that embeds the calculator using the shortcode), as well as the Text Preview field of a Project (injected on the edit project page)
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-2672
|
code-projects Payroll Management System add_deductions.php sql injection
|
A vulnerability was found in code-projects Payroll Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_deductions.php. The manipulation of the argument bir leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-6qw9-g8rh-fwxf
|
Buffer overflow in the SQLXML ISAPI extension of Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code via data queries with a long content-type parameter, aka "Unchecked Buffer in SQLXML ISAPI Extension."
|
[] | null | null | null | null | null |
|
GHSA-7rx2-769v-hrwf
|
HashiCorp Vault ldap auth method may not have correctly enforced MFA
|
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.
|
[] | null | 6.5 | null | null | null |
GHSA-p7qf-74jx-f6jj
|
Deserialization of Untrusted Data vulnerability in BoldThemes Amwerk allows Object Injection. This issue affects Amwerk: from n/a through 1.2.0.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-27171
|
Insecure permissions
|
A remote attacker using the insecure upload functionality will be able to overwrite any Python file and get Remote Code Execution. As for the affected products/models/versions, see the reference URL.
|
[
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
CVE-2024-7926
|
ZZCMS about_edit.php path traversal
|
A vulnerability classified as critical has been found in ZZCMS 2023. Affected is an unknown function of the file /admin/about_edit.php?action=modify. The manipulation of the argument skin leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
RHSA-2008:0826
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP01 security update
|
Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null | null |
ICSA-18-025-02B
|
Siemens Desigo PXC (Update C)
|
A remote attacker with network access to the device could potentially upload a new firmware image to the devices without prior authentication.
|
[] | null | 9.8 | null | null | null |
CVE-2024-5451
|
The7 — Website and eCommerce Builder for WordPress <= 11.13.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via url Attribute
|
The The7 — Website and eCommerce Builder for WordPress theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's Icon and Heading widgets in all versions up to, and including, 11.13.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2010-2384
|
Unspecified vulnerability in Oracle Solaris 9 and 10 allows local users to affect confidentiality and integrity via unknown vectors related to Solaris Management Console.
|
[
"cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"
] | null | null | null | 3.2 | null |
|
GHSA-45fw-7wjh-qgj9
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the newProname parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[] | null | 7.5 | null | null | null |
|
GHSA-89mx-ch25-5256
|
otool in Apple Xcode before 7.3 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via unspecified vectors.
|
[] | null | null | 7.8 | null | null |
|
CVE-2000-0129
|
Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST command on a malformed .lnk file.
|
[
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2023-21846
|
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Security). Supported versions that are affected are 5.9.0.0.0, 6.4.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-4wf3-x44x-f4f7
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | 7.8 | null | null | null |
|
GHSA-h5w6-cmx7-x823
|
Dell EMC iDRAC9 versions prior to 3.21.21.21 did not enforce the use of TLS/SSL for a connection to iDRAC web server for certain URLs. A man-in-the-middle attacker could use this vulnerability to strip the SSL/TLS protection from a connection between a client and a server.
|
[] | null | null | 5.9 | null | null |
|
CVE-2023-25131
|
Use of default password vulnerability in CyberPower PowerPanel Business
|
Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the 'admin' password.
|
[
"cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:linux:*:*",
"cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:macos:*:*",
"cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:virtual_machine:*:*",
"cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*"
] | null | 9.4 | null | null | null |
CVE-2025-21774
|
can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated
|
In the Linux kernel, the following vulnerability has been resolved:
can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated
Fix NULL pointer check in rkcanfd_handle_rx_fifo_overflow_int() to
bail out if skb cannot be allocated.
|
[] | null | 5.5 | null | null | null |
CVE-2011-3636
|
Cross-site request forgery (CSRF) vulnerability in the management interface in FreeIPA before 2.1.4 allows remote attackers to hijack the authentication of administrators for requests that make configuration changes.
|
[
"cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:0.99698-20080228:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:0.99698641-20080218:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.0.0:a:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.0.0:b:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.9.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.9.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.9.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.9.0:pre4:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:1.9.0:pre5:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:freeipa:2.1.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-6fjr-m7v6-fpg9
|
jquey is malware
|
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationIf you have found `jquey` installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
[] | null | null | null | null | null |
CVE-2021-47407
|
KVM: x86: Handle SRCU initialization failure during page track init
|
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Handle SRCU initialization failure during page track init
Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism. Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.
[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
|
[] | null | null | null | null | null |
GHSA-m445-w3xr-vp2f
|
soft-serve vulnerable to arbitrary code execution by crafting git-lfs requests
|
ImpactAny servers using soft-serve server and gitPatches0.7.5WorkaroundsNone.Referencesn/a.It is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git.The issue is that Soft Serve passes all environment variables given by the client to git subprocesses. This includes environment variables that control program execution, such as `LD_PRELOAD`.This can be exploited to execute arbitrary code by, for example, uploading a malicious shared object file to Soft Serve via Git LFS (uploading it via LFS ensures that it is not compressed on disk and easier to work with). The file will be stored under its SHA256 hash, so it has a predictable name.This file can then be referenced in `LD_PRELOAD` via a Soft Serve SSH session that causes git to be invoked. For example:The example LFS file patches a shared library function called by git to execute a shell.
|
[] | 8.6 | 8.1 | null | null | null |
CVE-2019-14093
|
Array out of bound access can occur in display module due to lack of bound check on input parcel received in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, QCM2150, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM636, SDM660, SDX20
|
[
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-m758-wc7v-8xpg
|
A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230822. It has been rated as critical. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238634 is the identifier assigned to this vulnerability.
|
[] | null | null | 6.3 | null | null |
|
GHSA-7q2j-gh72-pjrj
|
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension.
|
[] | null | null | 8.8 | null | null |
|
CVE-2025-5219
|
FreeFloat FTP Server ASCII Command buffer overflow
|
A vulnerability has been found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component ASCII Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-gjvw-h4x8-x57w
|
In rw_i93_sm_detect_ndef of rw_i93.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-121260197.
|
[] | null | null | 5 | null | null |
|
CVE-2025-20979
|
Out-of-bounds write in libsavscmn prior to Android 15 allows local attackers to execute arbitrary code.
|
[] | null | 8.4 | null | null | null |
|
GHSA-f7h5-c625-3795
|
Eclipse GlassFish is vulnerable to Server Side Request Forgery attacks through specific endpoints
|
In Eclipse GlassFish version 6.2.5, it is possible to perform a Server Side Request Forgery attack using specific endpoints.
|
[] | 8.9 | null | null | null | null |
GHSA-3256-58fp-785h
|
Cross Site Scripting (XSS) vulnerability in EasyEmail v.4.12.2 and before allows a local attacker to execute arbitrary code via the user input parameter(s). NOTE: Researcher claims issue is present in all versions prior and later than tested version.
|
[] | null | 6.1 | null | null | null |
|
CVE-2025-30726
|
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | 5.3 | null | null | null |
|
CVE-2023-4243
|
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
|
[
"cpe:2.3:a:full:full_-_customer:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2007-4170
|
Multiple PHP remote file inclusion vulnerabilities in AL-Athkar 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the (1) include parameter to (a) Main.php and (b) get.php and the (2) exec parameter to (c) count.php.
|
[
"cpe:2.3:a:al-athkar:al-athkar:2.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2021-20245
|
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 7.1 | null |
|
CVE-2013-3608
|
The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi.
|
[
"cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2021-37742
|
app/View/Elements/GalaxyClusters/view_relation_tree.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster relationships.
|
[
"cpe:2.3:a:misp:misp:2.4.147:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-9p84-g446-89ph
|
Multiple games developed by FUN labs, including 4X4 Off-road Adventure III, Big Game Hunter, Dangerous Hunts, Deer Hunt, Revolution, Secret Service, Shadow Force, and US Most Wanted, allow remote attackers to cause a denial of service via an empty UDP packet to the server, which cannot detect that a new packet has arrived using the socket ioctl.
|
[] | null | null | null | null | null |
|
GHSA-f76p-727c-9wqp
|
Out of bounds write vulnerability in the JPEG parsing code of Netop Vision Pro up to and including 9.7.2 allows an adjacent unauthenticated attacker to write to arbitrary memory potentially leading to a Denial of Service (DoS).
|
[] | null | null | null | null | null |
|
CVE-2024-29291
|
An issue in Laravel Framework 8 through 11 might allow a remote attacker to discover database credentials in storage/logs/laravel.log. NOTE: this is disputed by multiple third parties because the owner of a Laravel Framework installation can choose to have debugging logs, but needs to set the access control appropriately for the type of data that may be logged.
|
[
"cpe:2.3:a:laravel:framework:*:*:*:*:*:*:*:*"
] | null | null | null | null | null |
|
CVE-2018-8441
|
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
|
[
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2009-4470
|
SQL injection vulnerability in boardrule.php in DVBBS 2.0 allows remote attackers to execute arbitrary SQL commands via the groupboardid parameter.
|
[
"cpe:2.3:a:dvbbs:dvbbs:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-rm2m-chmf-gp2r
|
Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
|
[] | null | null | null | null | null |
|
CVE-2018-5535
|
On F5 BIG-IP 14.0.0, 13.0.0-13.1.0, 12.1.0-12.1.3, or 11.5.1-11.6.3 specifically crafted HTTP responses, when processed by a Virtual Server with an associated QoE profile that has Video enabled, may cause TMM to incorrectly buffer response data causing the TMM to restart resulting in a Denial of Service.
|
[
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-qmxc-jm57-x7h9
|
SQL injection vulnerability in Zengaia before 0.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2006-5647
|
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability."
|
[
"cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-hfjq-9qvp-vr83
|
TUTOS 1.3 allows remote attackers to read system information via a direct request to php/admin/phpinfo.php, which calls the phpinfo function.
|
[] | null | null | null | null | null |
|
CVE-2015-1650
|
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2014-1786
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1773, CVE-2014-1783, CVE-2014-1784, CVE-2014-1795, CVE-2014-1805, CVE-2014-2758, CVE-2014-2759, CVE-2014-2765, CVE-2014-2766, and CVE-2014-2775.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-hh5m-ff4f-2qxj
|
HCL MyXalytics is affected by an improper password policy implementation vulnerability. Weak passwords and lack of account lockout policies allow attackers to guess or brute-force passwords if the username is known.
|
[] | null | 4.8 | null | null | null |
|
CVE-2007-5131
|
SQL injection vulnerability in index.php in Interspire ActiveKB NX 2.x allows remote attackers to execute arbitrary SQL commands via the catId parameter in a browse action. NOTE: it was separately reported that ActiveKB 1.5 is also affected.
|
[
"cpe:2.3:a:interspire:activekb_nx:2:*:*:*:*:*:*:*",
"cpe:2.3:a:interspire:activekb_nx:2.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-c6hq-rccc-7p5f
|
A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. This vulnerability affects unknown code of the file /php/add_new_medicine.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2001-0960
|
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges.
|
[
"cpe:2.3:a:broadcom:arcserve_backup:6.61:sp2a:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:arcserve_backup_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:arcserve_backup_2000:*:*:advanced:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-ccm6-q86p-2hwx
|
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
|
[] | null | 7.5 | null | null | null |
|
CVE-2017-1683
|
IBM Connections Engagement Center 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134005.
|
[
"cpe:2.3:a:ibm:connections_engagement_center:6.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-q2wj-pp48-fpgj
|
Roundcube 1.5.x before 1.5.6 and 1.6.x before 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download).
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-50142
|
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
|
In the Linux kernel, the following vulnerability has been resolved:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
This expands the validation introduced in commit 07bf7908950a ("xfrm:
Validate address prefix lengths in the xfrm selector.")
syzbot created an SA with
usersa.sel.family = AF_UNSPEC
usersa.sel.prefixlen_s = 128
usersa.family = AF_INET
Because of the AF_UNSPEC selector, verify_newsa_info doesn't put
limits on prefixlen_{s,d}. But then copy_from_user_state sets
x->sel.family to usersa.family (AF_INET). Do the same conversion in
verify_newsa_info before validating prefixlen_{s,d}, since that's how
prefixlen is going to be used later on.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2022-29562
|
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). Affected devices do not properly handle malformed HTTP packets. This could allow an unauthenticated remote attacker to send a malformed HTTP packet causing certain functions to fail in a controlled manner.
|
[
"cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_mx5000re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_mx5000re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1524_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx1536_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*"
] | null | 3.7 | null | null | null |
|
GHSA-24wc-7r9r-xg28
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WEN Themes WEN Responsive Columns allows Stored XSS.This issue affects WEN Responsive Columns: from n/a through 1.3.2.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2021:0105
|
Red Hat Security Advisory: Red Hat Process Automation Manager 7.9.1 security update
|
XStream: remote code execution due to insecure XML deserialization when relying on blocklists
|
[
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.9"
] | null | 9 | null | null | null |
GHSA-3m6c-6c98-23qq
|
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.
|
[] | null | 2.4 | null | null | null |
|
RHSA-2020:0790
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8 | 4 | null | null |
GHSA-v495-vr49-324q
|
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
|
[] | null | 8.4 | null | null | null |
|
CVE-2023-2322
|
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
|
[
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | null | 5.2 | null | null |
GHSA-35x6-wg3h-rrv6
|
Session fixation vulnerability in SYNO.PhotoStation.Auth in Synology Photo Station before 6.8.7-3481 allows remote attackers to hijack web sessions via the PHPSESSID parameter.
|
[] | null | null | 6.3 | null | null |
|
GHSA-w4rw-xxg9-4xcp
|
Unrestricted file upload vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-22616
|
WeGIA Cross-Site Scripting (XSS) Stored endpoint 'dependente_parentesco_adicionar.php' parameter 'descricao'
|
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `dependente_parentesco_adicionar.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `dependente_parentesco_adicionar.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] | 6.4 | null | null | null | null |
CVE-2021-27401
|
The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS).
|
[
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*",
"cpe:2.3:a:mitel:micollab:9.2:-:*:*:*:-:*:*",
"cpe:2.3:a:mitel:micollab:9.2:fp1:*:*:*:-:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-c6rp-8vm7-pm5g
|
Windows Clustered Shared Volume Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29122, CVE-2022-29123, CVE-2022-29134.
|
[] | null | 6.5 | null | null | null |
|
ICSA-23-012-08
|
Siemens S7-1500 CPU devices
|
Affected devices do not contain an Immutable Root of Trust in Hardware. With this the integrity of the code executed on the device can not be validated during load-time. An attacker with physical access to the device could use this to replace the boot image of the device and execute arbitrary code.
|
[] | null | 4.6 | null | null | null |
CVE-2019-13655
|
Imgix through 2019-06-19 allows remote attackers to cause a denial of service (resource consumption) by manipulating a small JPEG file to specify dimensions of 64250x64250 pixels, which is mishandled during an attempt to load the 'whole image' into memory.
|
[
"cpe:2.3:a:imgix:imgix:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-2g2x-6p8h-94w3
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.4.37651. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Document objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13741.
|
[] | null | null | null | null | null |
|
CVE-2025-21983
|
mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq
|
In the Linux kernel, the following vulnerability has been resolved:
mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq
Currently kvfree_rcu() APIs use a system workqueue which is
"system_unbound_wq" to driver RCU machinery to reclaim a memory.
Recently, it has been noted that the following kernel warning can
be observed:
<snip>
workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work
WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120
Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...
CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1
Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023
Workqueue: nvme-wq nvme_scan_work
RIP: 0010:check_flush_dependency+0x112/0x120
Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...
RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082
RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027
RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88
RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd
R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400
R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000
CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0
PKRU: 55555554
Call Trace:
<TASK>
? __warn+0xa4/0x140
? check_flush_dependency+0x112/0x120
? report_bug+0xe1/0x140
? check_flush_dependency+0x112/0x120
? handle_bug+0x5e/0x90
? exc_invalid_op+0x16/0x40
? asm_exc_invalid_op+0x16/0x20
? timer_recalc_next_expiry+0x190/0x190
? check_flush_dependency+0x112/0x120
? check_flush_dependency+0x112/0x120
__flush_work.llvm.1643880146586177030+0x174/0x2c0
flush_rcu_work+0x28/0x30
kvfree_rcu_barrier+0x12f/0x160
kmem_cache_destroy+0x18/0x120
bioset_exit+0x10c/0x150
disk_release.llvm.6740012984264378178+0x61/0xd0
device_release+0x4f/0x90
kobject_put+0x95/0x180
nvme_put_ns+0x23/0xc0
nvme_remove_invalid_namespaces+0xb3/0xd0
nvme_scan_work+0x342/0x490
process_scheduled_works+0x1a2/0x370
worker_thread+0x2ff/0x390
? pwq_release_workfn+0x1e0/0x1e0
kthread+0xb1/0xe0
? __kthread_parkme+0x70/0x70
ret_from_fork+0x30/0x40
? __kthread_parkme+0x70/0x70
ret_from_fork_asm+0x11/0x20
</TASK>
---[ end trace 0000000000000000 ]---
<snip>
To address this switch to use of independent WQ_MEM_RECLAIM
workqueue, so the rules are not violated from workqueue framework
point of view.
Apart of that, since kvfree_rcu() does reclaim memory it is worth
to go with WQ_MEM_RECLAIM type of wq because it is designed for
this purpose.
|
[] | null | null | null | null | null |
GHSA-xpcw-3w24-57xc
|
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6. Processing a maliciously crafted USD file may disclose memory contents.
|
[] | null | 5.5 | null | null | null |
|
CVE-2017-0317
|
All versions of NVIDIA GPU and GeForce Experience installer contain a vulnerability where it fails to set proper permissions on the package extraction path thus allowing a non-privileged user to tamper with the extracted files, potentially leading to escalation of privileges via code execution.
|
[
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 6.9 | null |
|
GHSA-5vpj-4f48-j8qc
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Asgaros Asgaros Forum allows Stored XSS. This issue affects Asgaros Forum: from n/a through 3.0.0.
|
[] | null | 6.5 | null | null | null |
|
CVE-2014-9165
|
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-8455.
|
[
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-499w-c4pr-hwwh
|
Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-34484
|
Windows User Profile Service Elevation of Privilege Vulnerability
|
Windows User Profile Service Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1165:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1165:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20094:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25685:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23435:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20094:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2006-0012
|
Unspecified vulnerability in Windows Explorer in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via attack vectors involving COM objects and "crafted files and directories," aka the "Windows Shell Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-pr6w-w2r2-gm2g
|
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
|
[] | null | null | null | null | null |
|
GHSA-3g7x-q6q4-3cqc
|
Unspecified vulnerability in Vignette Content Management 7.3.0.5, 7.3.1, 7.3.1.1, 7.4, and 7.5 allows "low privileged" users to gain administrator privileges via unknown attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-q6h2-p7mg-mcvj
|
Cross-Site Scripting (XSS) vulnerability affecting LocalServer 1.0.9 that could allow a remote user to send a specially crafted query to an authenticated user and steal their session details through /testmail/index.php, parameter to.
|
[] | null | 6.1 | null | null | null |
|
GHSA-pxf7-7jp8-6443
|
Argument injection vulnerability in HyperAccess 8.4 allows user-assisted remote attackers to execute arbitrary vbscript and commands via the /r option in a telnet:// URI, which is configured to use hawin32.exe.
|
[] | null | null | null | null | null |
|
CVE-2021-29645
|
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
|
[
"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
CVE-2019-8019
|
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-32w4-gwv8-pcf9
|
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.
|
[] | null | null | null | null | null |
|
CVE-2025-24141
|
An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked.
|
[] | null | 3.3 | null | null | null |
|
CVE-2002-2006
|
The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
|
[
"cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-xffw-rwp4-xcg6
|
The diagnostics subsystem in the administrative web interface on Cisco Virtualization Experience (aka VXC) Client 6215 devices with firmware 11.2(27.4) allows local users to gain privileges for OS command execution via a crafted option value, aka Bug ID CSCug54412.
|
[] | null | null | null | null | null |
|
GHSA-9445-66j5-fhvj
|
The telnet administrator service running on port 650 on Gigaset DX600A v41.00-175 devices does not implement any lockout or throttling functionality. This situation (together with the weak password policy that forces a 4-digit password) allows remote attackers to easily obtain administrative access via brute-force attacks.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vf47-jc4w-pj9g
|
Multiple unspecified vulnerabilities in G15Daemon before 1.9.4 have unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-8gp3-qc4x-vw92
|
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Reader before 9.3 and PhantomPDF before 9.3, a different vulnerability than CVE-2018-16291, CVE-2018-16292, CVE-2018-16293, CVE-2018-16295, CVE-2018-16296, and CVE-2018-16297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2004:005
|
Red Hat Security Advisory: kdepim security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
GHSA-44m8-rxc2-jwp2
|
The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
|
[] | null | null | null | null | null |
|
CVE-2006-4716
|
PHP remote file inclusion vulnerability in demarrage.php in Fire Soft Board (FSB) RC3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the racine parameter.
|
[
"cpe:2.3:a:fire_soft_board:fire_soft_board:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-p8mg-76fj-rc53
|
IBM Tivoli Workload Scheduler 9.4, 9.5, and 10.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226328.
|
[] | null | 9.1 | null | null | null |
|
CVE-2012-1815
|
SQL injection vulnerability in Emerson DeltaV and DeltaV Workstations 9.3.1, 10.3.1, 11.3, and 11.3.1 and DeltaV ProEssentials Scientific Graph 5.0.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:emerson:deltav:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:11.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav_proessentials_scientific_graph:5.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav_workstation:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav_workstation:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav_workstation:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav_workstation:11.3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.