id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-6jhm-4vmx-mr76
SQL injection in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
[]
null
9.8
null
null
null
RHSA-2021:3459
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.8]
nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions nodejs-lodash: command injection via template
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.2
null
null
null
GHSA-h4cr-2595-v3p7
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability".
[]
null
null
7.5
null
null
GHSA-4f9c-3v6f-46qp
The Elementor plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.30.2 via the Import_Images::import() function due to insufficient controls on the filename specified. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
null
4.9
null
null
null
GHSA-g3j8-jppq-c6p4
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
[]
null
null
null
null
null
RHSA-2024:8981
Red Hat Security Advisory: OpenShift Container Platform 4.17.4 bug fix and security update
axios: axios: Server-Side Request Forgery dompurify: nesting-based mutation XSS vulnerability
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
8
null
null
null
GHSA-pmv2-x9cp-qmxj
Unspecified vulnerability in HP StoreVirtual 4000 Storage and StoreVirtual VSA 9.5 through 11.0 allows remote attackers to obtain sensitive information via unknown vectors.
[]
null
null
null
null
null
GHSA-h27g-wvvm-f6mv
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
[]
null
null
9.8
null
null
CVE-2020-1827
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
[ "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-5fwx-95cc-hcxv
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
[]
null
9.8
null
null
null
GHSA-44j9-88xc-f6c7
An issue was discovered in Bentley MicroStation before 10.17.0.x and Bentley View before 10.17.0.x. Using an affected version of MicroStation or MicroStation-based application to open an IFC file containing crafted data can force an out-of-bounds read. Exploitation of these vulnerabilities within the parsing of IFC files could enable an attacker to read information in the context of the current process.
[]
null
3.3
null
null
null
CVE-2024-11942
Drupal core - Moderately critical - Improper error handling - SA-CORE-2024-002
A vulnerability in Drupal Core allows File Manipulation.This issue affects Drupal Core: from 10.0.0 before 10.2.10.
[ "cpe:2.3:a:drupal:drupal_core:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
GHSA-6r3q-8mcr-xqjw
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime parameter from setSchedWifi function.
[]
null
8
null
null
null
CVE-2010-1889
Double free vulnerability in the kernel in Microsoft Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2, allows local users to gain privileges via a crafted application, related to object initialization during error handling, aka "Windows Kernel Double Free Vulnerability."
[ "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2016-4132
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
GHSA-jhj9-jh88-9vjh
The Simple Job Board plugin for WordPress is vulnerable to unauthorized access of data| due to insufficient authorization checking on the fetch_quick_job() function in all versions up to, and including, 2.10.8. This makes it possible for unauthenticated attackers to fetch arbitrary posts, which can be password protected or private and contain sensitive information.
[]
null
5.3
null
null
null
GHSA-4fg5-759r-24x3
DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file' parameter. By referencing specific files (e.g., cm3.xml), attackers can bypass access controls, leading to account takeover and potential privilege escalation.
[]
null
6
null
null
null
CVE-2021-24513
Form Builder < 1.9.8.4 - Authenticated Stored Cross-Site Scripting
The Form Builder | Create Responsive Contact Forms WordPress plugin before 1.9.8.4 does not sanitise or escape its Form Title, allowing high privilege users such as admin to set Cross-Site Scripting payload in them, even when the unfiltered_html capability is disallowed
[ "cpe:2.3:a:web-settler:form_builder:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
null
CVE-2023-30054
TOTOLINK A7100RU V7.4cu.2313_B20191024 has a Command Injection vulnerability. An attacker can obtain a stable root shell through a specially constructed payload.
[ "cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHSA-2017:3384
Red Hat Security Advisory: liblouis security update
liblouis: incomplete fix for CVE-2014-8184
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
null
GHSA-p637-6x4f-cmfc
Directory traversal vulnerability in EMC Documentum Thumbnail Server 6.7SP1 before P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P01 allows remote attackers to bypass intended Content Server access restrictions via unspecified vectors.
[]
null
null
null
null
null
GHSA-296f-4hq2-5r99
Web authoring command in Microsoft Content Management Server (MCMS) 2001 allows attackers to authenticate and upload executable content, by modifying the upload location, aka "Program Execution via MCMS Authoring Function."
[]
null
null
null
null
null
CVE-2019-11579
dhcp.c in dhcpcd before 7.2.1 contains a 1-byte read overflow with DHO_OPTSOVERLOADED.
[ "cpe:2.3:a:dhcpcd_project:dhcpcd:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-4f9w-3c78-j5r7
IBM MQ 8.0, (9.0, 9.1, 9.2 LTS), and (9.1 and 9.2 CD) are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226339.
[]
null
9.1
null
null
null
CVE-2019-17454
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_Descriptor::GetTag in Core/Ap4Descriptor.h, related to AP4_StsdAtom::GetSampleDescription in Core/Ap4StsdAtom.cpp, as demonstrated by mp4info.
[ "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2023-25751
Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-82p9-9f65-64v5
zzcms 8.2 allows remote attackers to discover the full path via a direct request to 3/qq_connect2.0/API/class/ErrorCase.class.php or 3/ucenter_api/code/friend.php.
[]
null
5.3
null
null
null
GHSA-jrh4-2gpv-4789
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
null
null
null
GHSA-g5px-4886-7gh9
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel Post Carousel & Slider allows Reflected XSS.This issue affects Post Carousel & Slider: from n/a through 1.0.4.
[]
null
7.1
null
null
null
CVE-2024-8215
Payload Injection Attack via Management REST interface
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51.
[ "cpe:2.3:a:payara_platform:payara_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*", "cpe:2.3:a:payara:payara:*:*:*:*:enterprise:*:*:*" ]
8.7
null
null
null
null
CVE-2019-19610
An issue was discovered in Halvotec RaQuest 10.23.10801.0. It allows session fixation. Fixed in Release 24.2020.20608.0.
[ "cpe:2.3:a:halvotec:raquest:10.23.10801.0:*:*:*:*:*:*:*" ]
null
5.4
null
5.8
null
GHSA-4v5f-52hr-fc58
IrfanView CADImage Plugin DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26202.
[]
null
null
7.8
null
null
GHSA-8crf-388w-629m
Transient DOS while processing the EHT operation IE in the received beacon frame.
[]
null
7.5
null
null
null
GHSA-85gf-wr67-f83w
curupira is vulnerable to SQL injection
A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The name of the patch is 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability.
[]
null
9.8
null
null
null
CVE-2021-46595
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15389.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
CVE-2009-3305
Polipo 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a Cache-Control header that lacks a value for the max-age field, which triggers a segmentation fault in the httpParseHeaders function in http_parse.c, and possibly other unspecified vectors.
[ "cpe:2.3:a:pps.jussieu:polipo:1.0.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-0797
The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 1.0.6.1. This makes it possible for subscribers and higher to execute functions intended for admin use.
[ "cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-vq87-xfrv-42wp
An issue was discovered in Digi ConnectPort LTS before 1.4.12. A Privilege Escalation vulnerability exists in the file upload feature. It allows an attacker on the local area network (with specific permissions) to upload and execute malicious files, potentially leading to unauthorized system access.
[]
null
8.8
null
null
null
CVE-2024-50437
WordPress GeoDirectory plugin <= 2.3.80 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AyeCode GeoDirectory allows Stored XSS.This issue affects GeoDirectory: from n/a through 2.3.80.
[]
null
6.5
null
null
null
CVE-2023-23388
Windows Bluetooth Driver Elevation of Privilege Vulnerability
Windows Bluetooth Driver Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2022-48922
riscv: fix oops caused by irqsoff latency tracer
In the Linux kernel, the following vulnerability has been resolved: riscv: fix oops caused by irqsoff latency tracer The trace_hardirqs_{on,off}() require the caller to setup frame pointer properly. This because these two functions use macro 'CALLER_ADDR1' (aka. __builtin_return_address(1)) to acquire caller info. If the $fp is used for other purpose, the code generated this macro (as below) could trigger memory access fault. 0xffffffff8011510e <+80>: ld a1,-16(s0) 0xffffffff80115112 <+84>: ld s2,-8(a1) # <-- paging fault here The oops message during booting if compiled with 'irqoff' tracer enabled: [ 0.039615][ T0] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8 [ 0.041925][ T0] Oops [#1] [ 0.042063][ T0] Modules linked in: [ 0.042864][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.0-rc1-00233-g9a20c48d1ed2 #29 [ 0.043568][ T0] Hardware name: riscv-virtio,qemu (DT) [ 0.044343][ T0] epc : trace_hardirqs_on+0x56/0xe2 [ 0.044601][ T0] ra : restore_all+0x12/0x6e [ 0.044721][ T0] epc : ffffffff80126a5c ra : ffffffff80003b94 sp : ffffffff81403db0 [ 0.044801][ T0] gp : ffffffff8163acd8 tp : ffffffff81414880 t0 : 0000000000000020 [ 0.044882][ T0] t1 : 0098968000000000 t2 : 0000000000000000 s0 : ffffffff81403de0 [ 0.044967][ T0] s1 : 0000000000000000 a0 : 0000000000000001 a1 : 0000000000000100 [ 0.045046][ T0] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000 [ 0.045124][ T0] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000054494d45 [ 0.045210][ T0] s2 : ffffffff80003b94 s3 : ffffffff81a8f1b0 s4 : ffffffff80e27b50 [ 0.045289][ T0] s5 : ffffffff81414880 s6 : ffffffff8160fa00 s7 : 00000000800120e8 [ 0.045389][ T0] s8 : 0000000080013100 s9 : 000000000000007f s10: 0000000000000000 [ 0.045474][ T0] s11: 0000000000000000 t3 : 7fffffffffffffff t4 : 0000000000000000 [ 0.045548][ T0] t5 : 0000000000000000 t6 : ffffffff814aa368 [ 0.045620][ T0] status: 0000000200000100 badaddr: 00000000000000f8 cause: 000000000000000d [ 0.046402][ T0] [<ffffffff80003b94>] restore_all+0x12/0x6e This because the $fp(aka. $s0) register is not used as frame pointer in the assembly entry code. resume_kernel: REG_L s0, TASK_TI_PREEMPT_COUNT(tp) bnez s0, restore_all REG_L s0, TASK_TI_FLAGS(tp) andi s0, s0, _TIF_NEED_RESCHED beqz s0, restore_all call preempt_schedule_irq j restore_all To fix above issue, here we add one extra level wrapper for function trace_hardirqs_{on,off}() so they can be safely called by low level entry code.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2024-2124
The Translate WordPress and go Multilingual – Weglot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget/block in all versions up to, and including, 4.2.5 due to insufficient input sanitization and output escaping on user supplied attributes such as 'className'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2025-29840
Windows Media Remote Code Execution Vulnerability
Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
[]
null
8.8
null
null
null
GHSA-ffr6-cv7v-5fr9
Missing Authorization vulnerability in Vektor,Inc. VK Block Patterns.This issue affects VK Block Patterns: from n/a through 1.31.0.
[]
null
5.3
null
null
null
GHSA-2q4w-v6pc-4834
WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
[]
null
null
null
null
null
GHSA-6gqq-xhwx-xpc2
SQL injection vulnerability in index.php in the eWriting (com_ewriting) 1.2.1 module for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat action.
[]
null
null
null
null
null
CVE-2017-0361
api.log contains passwords in plaintext
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains an information disclosure flaw, where the api.log might contain passwords in plaintext.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
null
null
7.8
2.1
null
GHSA-c7cr-mp49-9jj9
The Cloud Manager (aka com.ileaf.cloud_manager) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2025-6681
Fan Page <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via width Parameter
The Fan Page plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-j5w6-x5wc-6p8m
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) because proper filtration is omitted.
[]
null
null
6.1
null
null
GHSA-frgj-v2c7-6w2p
The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
[]
null
null
8.8
null
null
ICSA-24-326-05
Schneider Electric EcoStruxure IT Gateway
Schneider Electric is aware of a vulnerability in its EcoStruxure™ IT Gateway. The EcoStruxure™ IT Gateway is a component of the EcoStruxure™ IT platform, designed to connect your IT infrastructure devices to the cloud. It collects data from these devices and securely transmits it to the EcoStruxure™ IT platform for analysis and management. Failure to apply the fix provided below may risk unauthorized access to EcoStruxure™ IT Gateway which could result in control of the Gateway and/or retrieval of sensitive information.
[]
null
9.8
null
null
null
CVE-2005-0327
pafiledb.php in Pafiledb 3.1 may allow remote attackers to execute arbitrary PHP code via a modified action parameter that is used in an include statement for login.php.
[ "cpe:2.3:a:php_arena:pafiledb:3.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-21130
Substance3D - Stager | Out-of-bounds Write (CWE-787)
Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2021-41191
API giving out files without key
Roblox-Purchasing-Hub is an open source Roblox product purchasing hub. A security risk in versions 1.0.1 and prior allowed people who have someone's API URL to get product files without an API key. This issue is fixed in version 1.0.2. As a workaround, add `@require_apikey` in `BOT/lib/cogs/website.py` under the route for `/v1/products`.
[ "cpe:2.3:a:redon:roblox_purchasing_hub:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-934g-qjpp-c7xg
FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aaccoder, which allows a remote malicious user to cause a Denial of Service
[]
null
null
null
null
null
GHSA-c392-wrgw-jjfw
OpenShift Hive Has an Uncontrolled Resource Consumption Vulnerability
A flaw was found in the Hive hibernation controller component of OpenShift Dedicated. The ClusterDeployment.hive.openshift.io/v1 resource can be created with the spec.installed field set to true, regardless of the installation status, and a positive timespan for the spec.hibernateAfter value. If a ClusterSync.hiveinternal.openshift.io/v1alpha1 resource is also created, the hive hibernation controller will enter the reconciliation loop leading to a panic when accessing a non-existing field in the ClusterDeployment’s status section, resulting in a denial of service.
[]
null
4.3
null
null
null
GHSA-p2v3-4j32-qj67
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the REMOTE_USER parameter in the get_access (sub_45AC2C) function.
[]
null
9.8
null
null
null
GHSA-f99v-cqxr-cqqw
Improper Neutralization vulnerability affects OpenText ALM Octane version 16.2.100 and above. The vulnerability could result in a remote code execution attack.
[]
null
7.5
null
null
null
CVE-2012-6042
GPSMapEdit 1.1.73.2 allows user-assisted remote attackers to cause a denial of service (crash) via a long string in a lst file.
[ "cpe:2.3:a:geopainting:gpsmapedit:1.1.73.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-2jq3-6582-8qfm
cPanel before 68.0.27 allows attackers to read the SRS secret via exim.conf (SEC-308).
[]
null
null
null
null
null
GHSA-pq8r-49xc-839h
Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI.
[]
null
null
null
null
null
CVE-2018-15335
When APM 13.0.0-13.1.x is deployed as an OAuth Resource Server, APM becomes a client application to an external OAuth authorization server. In certain cases when communication between the BIG-IP APM and the OAuth authorization server is lost, APM may not display the intended message in the failure response
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
GHSA-9mm8-jmrr-729x
A Buffer Overflow vulnerabilty exists in Miniftpd 1.0 in the do_mkd function in the ftpproto.c file, which could let a remote malicious user cause a Denial of Service.
[]
null
null
null
null
null
CVE-2022-20953
Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-xwh4-p62h-wq65
The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.
[]
null
null
8.8
null
null
GHSA-89r2-5g34-2g47
Symfony Open Redirect
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
[]
null
null
6.1
null
null
CVE-2023-47670
WordPress Korea SNS Plugin <= 1.6.3 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Jongmyoung Kim Korea SNS.This issue affects Korea SNS: from n/a through 1.6.3.
[ "cpe:2.3:a:icansoft:korea_sns:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-7345-q82m-2h46
This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to enumerate a user's installed apps.
[]
null
9.8
null
null
null
GHSA-m2hm-7hww-7mr3
IrfanView SVG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SVG files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22185.
[]
null
null
7.8
null
null
CVE-2016-6885
The pstm_exptmod function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid free and crash) via a base zero value for the modular exponentiation.
[ "cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-8jjp-gvwj-qfgr
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
[]
null
null
null
null
null
CVE-2019-5130
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*" ]
null
null
8
null
null
CVE-2012-5270
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2020-3174
Cisco NX-OS Software Anycast Gateway Invalid ARP Vulnerability
A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.
[ "cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*" ]
null
null
4.7
null
null
GHSA-m6cg-292h-c82c
Cross-site scripting (XSS) vulnerability in bwired allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2022-4355
LetsRecover < 1.2.0 - Admin+ SQLi
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
[ "cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
null
CVE-2018-11774
Apache VCL versions 2.1 through 2.5 do not properly validate form input when adding and removing VMs to and from hosts. The form data is then used in SQL statements. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.
[ "cpe:2.3:a:apache:virtual_computing_lab:*:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
CVE-2014-8006
The Disaster Recovery (DRA) feature on the Cisco ISB8320-E High-Definition IP-Only DVR allows remote attackers to bypass authentication by establishing a TELNET session during a recovery boot, aka Bug ID CSCup85422.
[ "cpe:2.3:h:cisco:isb8320-e_high-definition_ip-only_dvr:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2006-3849
Stack-based buffer overflow in Warzone 2100 and Warzone Resurrection 2.0.3 and earlier allows remote attackers to execute arbitrary code via a (1) long message handled by the recvTextMessage function in multiplay.c or a (2) long filename handled by NETrecvFile function in netplay/netplay.c.
[ "cpe:2.3:a:pumpkin_studios:warzone:2100:*:*:*:*:*:*:*", "cpe:2.3:a:pumpkin_studios:warzone_resurrection:2.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-20145
Tecrail Responsive Filemanger path traversal
A vulnerability was found in Tecrail Responsive Filemanger up to 9.10.x and classified as critical. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.11.0 is able to address this issue. It is recommended to upgrade the affected component.
[ "cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2023-4136
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crafter Engine
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CrafterCMS Engine on Windows, MacOS, Linux, x86, ARM, 64 bit allows Reflected XSS.This issue affects CrafterCMS: from 4.0.0 through 4.0.2, from 3.1.0 through 3.1.27.
[ "cpe:2.3:a:craftercms:craftercms:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:arm:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:x64:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:x86:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:arm:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*" ]
null
7.4
null
null
null
CVE-2004-2425
Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to execute arbitrary commands via accent (`) and possibly other shell metacharacters in the query string to virtualinput.cgi.
[ "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2130_ptz_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2130_ptz_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2130_ptz_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2130_ptz_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2130_ptz_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:230_mpeg2_video_server:3.11:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:1.1:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:1.2:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:1.10:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:1.11:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:1.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:1.15:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.20:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.33:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:1.0_1:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:1.15:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:2.20:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:2.33:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:3.13:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2411_video_server:3.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2411_video_server:3.13:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_video_server:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_video_server:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2460_network_dvr:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2460_network_dvr:3.10:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2460_network_dvr:3.11:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2490_serial_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2490_serial_server:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:h:axis:250s_video_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:250s_video_server:3.03:*:*:*:*:*:*:*", "cpe:2.3:h:axis:250s_video_server:3.10:*:*:*:*:*:*:*", "cpe:2.3:h:axis:storpoint_cd:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-6295
so-widgets-bundle < 1.51.0 - Admin+ Local File Inclusion
The SiteOrigin Widgets Bundle WordPress plugin before 1.51.0 does not validate user input before using it to generate paths passed to include function/s, allowing users with the administrator role to perform LFI attacks in the context of Multisite WordPress sites.
[ "cpe:2.3:a:siteorigin:siteorigin_widgets_bundle:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
null
GHSA-4v3r-qxrm-f63q
The Transition Scheduler add-on 6.5.0 for Atlassian Jira is prone to stored XSS via the project name to the creation function.
[]
null
5.4
null
null
null
CVE-2024-35582
A cross-site scripting (XSS) vulnerability in Sourcecodester Laboratory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Department input field.
[ "cpe:2.3:a:sourcecodester:laboratory_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2007-0520
SQL injection vulnerability in banner.php in Unique Ads (UDS) 1.x allows remote attackers to execute arbitrary SQL commands via the bid parameter.
[ "cpe:2.3:a:unique_ads:unique_ads:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-rg2x-vfx2-2h76
Multiple cross-site scripting (XSS) vulnerabilities in Serendipity 0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) templatedropdown and (2) shoutbox plugins.
[]
null
null
null
null
null
GHSA-qwf4-gh23-f5jj
Debian-edu-config all versions < 2.11.10, a set of configuration files used for Debian Edu, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other Kerberos user principals.
[]
null
7.8
null
null
null
CVE-2021-1594
Cisco Identity Services Engine Privilege Escalation Vulnerability
A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes.
[ "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4\\(0.902\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6\\(0.156\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7\\(0.903\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0\\(0.458\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1\\(0.440\\):*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-9279
funnyzpc Mee-Admin User Center index cross site scripting
A vulnerability, which was classified as problematic, was found in funnyzpc Mee-Admin up to 1.6. This affects an unknown part of the file /mee/index of the component User Center. The manipulation of the argument User Nickname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:funnyzpc:mee-admin:*:*:*:*:*:*:*:*" ]
5.1
2.4
2.4
3.3
null
CVE-2006-1245
Buffer overflow in mshtml.dll in Microsoft Internet Explorer 6.0.2900.2180, and probably other versions, allows remote attackers to execute arbitrary code via an HTML tag with a large number of script action handlers such as onload and onmouseover, as demonstrated using onclick, aka the "Multiple Event Handler Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-2824
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
[ "cpe:2.3:a:zabbix:zabbix:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:2.4.9:rc1:*:*:*:*:*:*" ]
null
null
8.1
6.8
null
CVE-2009-2123
Multiple SQL injection vulnerabilities in Elvin 1.2.0 allow remote attackers to execute arbitrary SQL commands via the (1) inUser (aka Username) and (2) inPass (aka Password) parameters to (a) inc/login.ei, reachable through login.php; and the (3) id parameter to (b) show_bug.php and (c) show_activity.php. NOTE: it was later reported that vector 3c also affects 1.2.2.
[ "cpe:2.3:a:elvinbts:elvinbts:1.2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-51062
An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command.
[ "cpe:2.3:a:qstar:archive_storage_manager:3-0:build7_patch0:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-rrq6-gq4w-89r8
Windows Kernel Elevation of Privilege Vulnerability
[]
null
7
null
null
null
CVE-2017-17417
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Acknowledge method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4228.
[ "cpe:2.3:a:quest:netvault_backup:11.3.0.12:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-fxvx-gfmr-5xfj
Koillection Cross Site Scripting vulnerability
Cross Site Scripting vulnerability in Koillection v.1.6.10 allows a remote attacker to escalate privileges via the collection, Wishlist and album components
[]
null
6.1
null
null
null
GHSA-c842-547h-7gp8
An issue in the HuginBase::PanoramaMemento::loadPTScript function of Hugin v2022.0.0 allows attackers to cause a heap buffer overflow via parsing a crafted image.
[]
null
7.8
null
null
null
GHSA-w8hg-4qvm-86wh
Member_ProfileForm in security/Member.php in SilverStripe 2.3.x before 2.3.7 allows remote attackers to hijack user accounts by saving data using the email address (ID) of another user.
[]
null
null
null
null
null