id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-6jhm-4vmx-mr76
|
SQL injection in Moodle
|
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
|
[] | null | 9.8 | null | null | null |
RHSA-2021:3459
|
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.8]
|
nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions nodejs-lodash: command injection via template
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.2 | null | null | null |
GHSA-h4cr-2595-v3p7
|
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability".
|
[] | null | null | 7.5 | null | null |
|
GHSA-4f9c-3v6f-46qp
|
The Elementor plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.30.2 via the Import_Images::import() function due to insufficient controls on the filename specified. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
|
[] | null | 4.9 | null | null | null |
|
GHSA-g3j8-jppq-c6p4
|
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
|
[] | null | null | null | null | null |
|
RHSA-2024:8981
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.4 bug fix and security update
|
axios: axios: Server-Side Request Forgery dompurify: nesting-based mutation XSS vulnerability
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 8 | null | null | null |
GHSA-pmv2-x9cp-qmxj
|
Unspecified vulnerability in HP StoreVirtual 4000 Storage and StoreVirtual VSA 9.5 through 11.0 allows remote attackers to obtain sensitive information via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-h27g-wvvm-f6mv
|
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
|
[] | null | null | 9.8 | null | null |
|
CVE-2020-1827
|
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
|
[
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-5fwx-95cc-hcxv
|
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
|
[] | null | 9.8 | null | null | null |
|
GHSA-44j9-88xc-f6c7
|
An issue was discovered in Bentley MicroStation before 10.17.0.x and Bentley View before 10.17.0.x. Using an affected version of MicroStation or MicroStation-based application to open an IFC file containing crafted data can force an out-of-bounds read. Exploitation of these vulnerabilities within the parsing of IFC files could enable an attacker to read information in the context of the current process.
|
[] | null | 3.3 | null | null | null |
|
CVE-2024-11942
|
Drupal core - Moderately critical - Improper error handling - SA-CORE-2024-002
|
A vulnerability in Drupal Core allows File Manipulation.This issue affects Drupal Core: from 10.0.0 before 10.2.10.
|
[
"cpe:2.3:a:drupal:drupal_core:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-6r3q-8mcr-xqjw
|
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime parameter from setSchedWifi function.
|
[] | null | 8 | null | null | null |
|
CVE-2010-1889
|
Double free vulnerability in the kernel in Microsoft Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2, allows local users to gain privileges via a crafted application, related to object initialization during error handling, aka "Windows Kernel Double Free Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2016-4132
|
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-jhj9-jh88-9vjh
|
The Simple Job Board plugin for WordPress is vulnerable to unauthorized access of data| due to insufficient authorization checking on the fetch_quick_job() function in all versions up to, and including, 2.10.8. This makes it possible for unauthenticated attackers to fetch arbitrary posts, which can be password protected or private and contain sensitive information.
|
[] | null | 5.3 | null | null | null |
|
GHSA-4fg5-759r-24x3
|
DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file' parameter. By referencing specific files (e.g., cm3.xml), attackers can bypass access controls, leading to account takeover and potential privilege escalation.
|
[] | null | 6 | null | null | null |
|
CVE-2021-24513
|
Form Builder < 1.9.8.4 - Authenticated Stored Cross-Site Scripting
|
The Form Builder | Create Responsive Contact Forms WordPress plugin before 1.9.8.4 does not sanitise or escape its Form Title, allowing high privilege users such as admin to set Cross-Site Scripting payload in them, even when the unfiltered_html capability is disallowed
|
[
"cpe:2.3:a:web-settler:form_builder:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
CVE-2023-30054
|
TOTOLINK A7100RU V7.4cu.2313_B20191024 has a Command Injection vulnerability. An attacker can obtain a stable root shell through a specially constructed payload.
|
[
"cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2017:3384
|
Red Hat Security Advisory: liblouis security update
|
liblouis: incomplete fix for CVE-2014-8184
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null | null |
GHSA-p637-6x4f-cmfc
|
Directory traversal vulnerability in EMC Documentum Thumbnail Server 6.7SP1 before P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P01 allows remote attackers to bypass intended Content Server access restrictions via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-296f-4hq2-5r99
|
Web authoring command in Microsoft Content Management Server (MCMS) 2001 allows attackers to authenticate and upload executable content, by modifying the upload location, aka "Program Execution via MCMS Authoring Function."
|
[] | null | null | null | null | null |
|
CVE-2019-11579
|
dhcp.c in dhcpcd before 7.2.1 contains a 1-byte read overflow with DHO_OPTSOVERLOADED.
|
[
"cpe:2.3:a:dhcpcd_project:dhcpcd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-4f9w-3c78-j5r7
|
IBM MQ 8.0, (9.0, 9.1, 9.2 LTS), and (9.1 and 9.2 CD) are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226339.
|
[] | null | 9.1 | null | null | null |
|
CVE-2019-17454
|
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_Descriptor::GetTag in Core/Ap4Descriptor.h, related to AP4_StsdAtom::GetSampleDescription in Core/Ap4StsdAtom.cpp, as demonstrated by mp4info.
|
[
"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2023-25751
|
Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-82p9-9f65-64v5
|
zzcms 8.2 allows remote attackers to discover the full path via a direct request to 3/qq_connect2.0/API/class/ErrorCase.class.php or 3/ucenter_api/code/friend.php.
|
[] | null | 5.3 | null | null | null |
|
GHSA-jrh4-2gpv-4789
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | null | null | null |
|
GHSA-g5px-4886-7gh9
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel Post Carousel & Slider allows Reflected XSS.This issue affects Post Carousel & Slider: from n/a through 1.0.4.
|
[] | null | 7.1 | null | null | null |
|
CVE-2024-8215
|
Payload Injection Attack via Management REST interface
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51.
|
[
"cpe:2.3:a:payara_platform:payara_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*",
"cpe:2.3:a:payara:payara:*:*:*:*:enterprise:*:*:*"
] | 8.7 | null | null | null | null |
CVE-2019-19610
|
An issue was discovered in Halvotec RaQuest 10.23.10801.0. It allows session fixation. Fixed in Release 24.2020.20608.0.
|
[
"cpe:2.3:a:halvotec:raquest:10.23.10801.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 5.8 | null |
|
GHSA-4v5f-52hr-fc58
|
IrfanView CADImage Plugin DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26202.
|
[] | null | null | 7.8 | null | null |
|
GHSA-8crf-388w-629m
|
Transient DOS while processing the EHT operation IE in the received beacon frame.
|
[] | null | 7.5 | null | null | null |
|
GHSA-85gf-wr67-f83w
|
curupira is vulnerable to SQL injection
|
A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The name of the patch is 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
CVE-2021-46595
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15389.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
CVE-2009-3305
|
Polipo 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a Cache-Control header that lacks a value for the max-age field, which triggers a segmentation fault in the httpParseHeaders function in http_parse.c, and possibly other unspecified vectors.
|
[
"cpe:2.3:a:pps.jussieu:polipo:1.0.4:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-0797
|
The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 1.0.6.1. This makes it possible for subscribers and higher to execute functions intended for admin use.
|
[
"cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-vq87-xfrv-42wp
|
An issue was discovered in Digi ConnectPort LTS before 1.4.12. A Privilege Escalation vulnerability exists in the file upload feature. It allows an attacker on the local area network (with specific permissions) to upload and execute malicious files, potentially leading to unauthorized system access.
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-50437
|
WordPress GeoDirectory plugin <= 2.3.80 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AyeCode GeoDirectory allows Stored XSS.This issue affects GeoDirectory: from n/a through 2.3.80.
|
[] | null | 6.5 | null | null | null |
CVE-2023-23388
|
Windows Bluetooth Driver Elevation of Privilege Vulnerability
|
Windows Bluetooth Driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2022-48922
|
riscv: fix oops caused by irqsoff latency tracer
|
In the Linux kernel, the following vulnerability has been resolved:
riscv: fix oops caused by irqsoff latency tracer
The trace_hardirqs_{on,off}() require the caller to setup frame pointer
properly. This because these two functions use macro 'CALLER_ADDR1' (aka.
__builtin_return_address(1)) to acquire caller info. If the $fp is used
for other purpose, the code generated this macro (as below) could trigger
memory access fault.
0xffffffff8011510e <+80>: ld a1,-16(s0)
0xffffffff80115112 <+84>: ld s2,-8(a1) # <-- paging fault here
The oops message during booting if compiled with 'irqoff' tracer enabled:
[ 0.039615][ T0] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8
[ 0.041925][ T0] Oops [#1]
[ 0.042063][ T0] Modules linked in:
[ 0.042864][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.0-rc1-00233-g9a20c48d1ed2 #29
[ 0.043568][ T0] Hardware name: riscv-virtio,qemu (DT)
[ 0.044343][ T0] epc : trace_hardirqs_on+0x56/0xe2
[ 0.044601][ T0] ra : restore_all+0x12/0x6e
[ 0.044721][ T0] epc : ffffffff80126a5c ra : ffffffff80003b94 sp : ffffffff81403db0
[ 0.044801][ T0] gp : ffffffff8163acd8 tp : ffffffff81414880 t0 : 0000000000000020
[ 0.044882][ T0] t1 : 0098968000000000 t2 : 0000000000000000 s0 : ffffffff81403de0
[ 0.044967][ T0] s1 : 0000000000000000 a0 : 0000000000000001 a1 : 0000000000000100
[ 0.045046][ T0] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
[ 0.045124][ T0] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000054494d45
[ 0.045210][ T0] s2 : ffffffff80003b94 s3 : ffffffff81a8f1b0 s4 : ffffffff80e27b50
[ 0.045289][ T0] s5 : ffffffff81414880 s6 : ffffffff8160fa00 s7 : 00000000800120e8
[ 0.045389][ T0] s8 : 0000000080013100 s9 : 000000000000007f s10: 0000000000000000
[ 0.045474][ T0] s11: 0000000000000000 t3 : 7fffffffffffffff t4 : 0000000000000000
[ 0.045548][ T0] t5 : 0000000000000000 t6 : ffffffff814aa368
[ 0.045620][ T0] status: 0000000200000100 badaddr: 00000000000000f8 cause: 000000000000000d
[ 0.046402][ T0] [<ffffffff80003b94>] restore_all+0x12/0x6e
This because the $fp(aka. $s0) register is not used as frame pointer in the
assembly entry code.
resume_kernel:
REG_L s0, TASK_TI_PREEMPT_COUNT(tp)
bnez s0, restore_all
REG_L s0, TASK_TI_FLAGS(tp)
andi s0, s0, _TIF_NEED_RESCHED
beqz s0, restore_all
call preempt_schedule_irq
j restore_all
To fix above issue, here we add one extra level wrapper for function
trace_hardirqs_{on,off}() so they can be safely called by low level entry
code.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2024-2124
|
The Translate WordPress and go Multilingual – Weglot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget/block in all versions up to, and including, 4.2.5 due to insufficient input sanitization and output escaping on user supplied attributes such as 'className'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2025-29840
|
Windows Media Remote Code Execution Vulnerability
|
Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
|
[] | null | 8.8 | null | null | null |
GHSA-ffr6-cv7v-5fr9
|
Missing Authorization vulnerability in Vektor,Inc. VK Block Patterns.This issue affects VK Block Patterns: from n/a through 1.31.0.
|
[] | null | 5.3 | null | null | null |
|
GHSA-2q4w-v6pc-4834
|
WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
|
[] | null | null | null | null | null |
|
GHSA-6gqq-xhwx-xpc2
|
SQL injection vulnerability in index.php in the eWriting (com_ewriting) 1.2.1 module for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat action.
|
[] | null | null | null | null | null |
|
CVE-2017-0361
|
api.log contains passwords in plaintext
|
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains an information disclosure flaw, where the api.log might contain passwords in plaintext.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 2.1 | null |
GHSA-c7cr-mp49-9jj9
|
The Cloud Manager (aka com.ileaf.cloud_manager) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2025-6681
|
Fan Page <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via width Parameter
|
The Fan Page plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-j5w6-x5wc-6p8m
|
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) because proper filtration is omitted.
|
[] | null | null | 6.1 | null | null |
|
GHSA-frgj-v2c7-6w2p
|
The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
|
[] | null | null | 8.8 | null | null |
|
ICSA-24-326-05
|
Schneider Electric EcoStruxure IT Gateway
|
Schneider Electric is aware of a vulnerability in its EcoStruxure™ IT Gateway.
The EcoStruxure™ IT Gateway is a component of the EcoStruxure™ IT platform, designed to
connect your IT infrastructure devices to the cloud. It collects data from these devices and
securely transmits it to the EcoStruxure™ IT platform for analysis and management.
Failure to apply the fix provided below may risk unauthorized access to EcoStruxure™ IT
Gateway which could result in control of the Gateway and/or retrieval of sensitive information.
|
[] | null | 9.8 | null | null | null |
CVE-2005-0327
|
pafiledb.php in Pafiledb 3.1 may allow remote attackers to execute arbitrary PHP code via a modified action parameter that is used in an include statement for login.php.
|
[
"cpe:2.3:a:php_arena:pafiledb:3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-21130
|
Substance3D - Stager | Out-of-bounds Write (CWE-787)
|
Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
CVE-2021-41191
|
API giving out files without key
|
Roblox-Purchasing-Hub is an open source Roblox product purchasing hub. A security risk in versions 1.0.1 and prior allowed people who have someone's API URL to get product files without an API key. This issue is fixed in version 1.0.2. As a workaround, add `@require_apikey` in `BOT/lib/cogs/website.py` under the route for `/v1/products`.
|
[
"cpe:2.3:a:redon:roblox_purchasing_hub:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-934g-qjpp-c7xg
|
FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aaccoder, which allows a remote malicious user to cause a Denial of Service
|
[] | null | null | null | null | null |
|
GHSA-c392-wrgw-jjfw
|
OpenShift Hive Has an Uncontrolled Resource Consumption Vulnerability
|
A flaw was found in the Hive hibernation controller component of OpenShift Dedicated. The ClusterDeployment.hive.openshift.io/v1 resource can be created with the spec.installed field set to true, regardless of the installation status, and a positive timespan for the spec.hibernateAfter value. If a ClusterSync.hiveinternal.openshift.io/v1alpha1 resource is also created, the hive hibernation controller will enter the reconciliation loop leading to a panic when accessing a non-existing field in the ClusterDeployment’s status section, resulting in a denial of service.
|
[] | null | 4.3 | null | null | null |
GHSA-p2v3-4j32-qj67
|
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the REMOTE_USER parameter in the get_access (sub_45AC2C) function.
|
[] | null | 9.8 | null | null | null |
|
GHSA-f99v-cqxr-cqqw
|
Improper Neutralization vulnerability affects OpenText ALM Octane version 16.2.100 and above. The vulnerability could result in a remote code execution attack.
|
[] | null | 7.5 | null | null | null |
|
CVE-2012-6042
|
GPSMapEdit 1.1.73.2 allows user-assisted remote attackers to cause a denial of service (crash) via a long string in a lst file.
|
[
"cpe:2.3:a:geopainting:gpsmapedit:1.1.73.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-2jq3-6582-8qfm
|
cPanel before 68.0.27 allows attackers to read the SRS secret via exim.conf (SEC-308).
|
[] | null | null | null | null | null |
|
GHSA-pq8r-49xc-839h
|
Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI.
|
[] | null | null | null | null | null |
|
CVE-2018-15335
|
When APM 13.0.0-13.1.x is deployed as an OAuth Resource Server, APM becomes a client application to an external OAuth authorization server. In certain cases when communication between the BIG-IP APM and the OAuth authorization server is lost, APM may not display the intended message in the failure response
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-9mm8-jmrr-729x
|
A Buffer Overflow vulnerabilty exists in Miniftpd 1.0 in the do_mkd function in the ftpproto.c file, which could let a remote malicious user cause a Denial of Service.
|
[] | null | null | null | null | null |
|
CVE-2022-20953
|
Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities
|
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-xwh4-p62h-wq65
|
The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.
|
[] | null | null | 8.8 | null | null |
|
GHSA-89r2-5g34-2g47
|
Symfony Open Redirect
|
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
|
[] | null | null | 6.1 | null | null |
CVE-2023-47670
|
WordPress Korea SNS Plugin <= 1.6.3 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Jongmyoung Kim Korea SNS.This issue affects Korea SNS: from n/a through 1.6.3.
|
[
"cpe:2.3:a:icansoft:korea_sns:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-7345-q82m-2h46
|
This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to enumerate a user's installed apps.
|
[] | null | 9.8 | null | null | null |
|
GHSA-m2hm-7hww-7mr3
|
IrfanView SVG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SVG files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22185.
|
[] | null | null | 7.8 | null | null |
|
CVE-2016-6885
|
The pstm_exptmod function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid free and crash) via a base zero value for the modular exponentiation.
|
[
"cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-8jjp-gvwj-qfgr
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
CVE-2019-5130
|
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*"
] | null | null | 8 | null | null |
|
CVE-2012-5270
|
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2020-3174
|
Cisco NX-OS Software Anycast Gateway Invalid ARP Vulnerability
|
A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.
|
[
"cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*"
] | null | null | 4.7 | null | null |
GHSA-m6cg-292h-c82c
|
Cross-site scripting (XSS) vulnerability in bwired allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-4355
|
LetsRecover < 1.2.0 - Admin+ SQLi
|
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
|
[
"cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
CVE-2018-11774
|
Apache VCL versions 2.1 through 2.5 do not properly validate form input when adding and removing VMs to and from hosts. The form data is then used in SQL statements. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.
|
[
"cpe:2.3:a:apache:virtual_computing_lab:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
CVE-2014-8006
|
The Disaster Recovery (DRA) feature on the Cisco ISB8320-E High-Definition IP-Only DVR allows remote attackers to bypass authentication by establishing a TELNET session during a recovery boot, aka Bug ID CSCup85422.
|
[
"cpe:2.3:h:cisco:isb8320-e_high-definition_ip-only_dvr:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2006-3849
|
Stack-based buffer overflow in Warzone 2100 and Warzone Resurrection 2.0.3 and earlier allows remote attackers to execute arbitrary code via a (1) long message handled by the recvTextMessage function in multiplay.c or a (2) long filename handled by NETrecvFile function in netplay/netplay.c.
|
[
"cpe:2.3:a:pumpkin_studios:warzone:2100:*:*:*:*:*:*:*",
"cpe:2.3:a:pumpkin_studios:warzone_resurrection:2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-20145
|
Tecrail Responsive Filemanger path traversal
|
A vulnerability was found in Tecrail Responsive Filemanger up to 9.10.x and classified as critical. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.11.0 is able to address this issue. It is recommended to upgrade the affected component.
|
[
"cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
CVE-2023-4136
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crafter Engine
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CrafterCMS Engine on Windows, MacOS, Linux, x86, ARM, 64 bit allows Reflected XSS.This issue affects CrafterCMS: from 4.0.0 through 4.0.2, from 3.1.0 through 3.1.27.
|
[
"cpe:2.3:a:craftercms:craftercms:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:arm:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:arm:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*"
] | null | 7.4 | null | null | null |
CVE-2004-2425
|
Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to execute arbitrary commands via accent (`) and possibly other shell metacharacters in the query string to virtualinput.cgi.
|
[
"cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2130_ptz_network_camera:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2130_ptz_network_camera:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2130_ptz_network_camera:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2130_ptz_network_camera:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2130_ptz_network_camera:2.40:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:230_mpeg2_video_server:3.11:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:1.10:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:1.11:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:1.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:1.15:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.20:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.33:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:1.0_1:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:1.15:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:2.20:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:2.33:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2401_video_server:3.13:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2411_video_server:3.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2411_video_server:3.13:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_video_server:2.32:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2420_video_server:2.34:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2460_network_dvr:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2460_network_dvr:3.10:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2460_network_dvr:3.11:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2490_serial_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:2490_serial_server:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:250s_video_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:250s_video_server:3.03:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:250s_video_server:3.10:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:storpoint_cd:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-6295
|
so-widgets-bundle < 1.51.0 - Admin+ Local File Inclusion
|
The SiteOrigin Widgets Bundle WordPress plugin before 1.51.0 does not validate user input before using it to generate paths passed to include function/s, allowing users with the administrator role to perform LFI attacks in the context of Multisite WordPress sites.
|
[
"cpe:2.3:a:siteorigin:siteorigin_widgets_bundle:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
GHSA-4v3r-qxrm-f63q
|
The Transition Scheduler add-on 6.5.0 for Atlassian Jira is prone to stored XSS via the project name to the creation function.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-35582
|
A cross-site scripting (XSS) vulnerability in Sourcecodester Laboratory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Department input field.
|
[
"cpe:2.3:a:sourcecodester:laboratory_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2007-0520
|
SQL injection vulnerability in banner.php in Unique Ads (UDS) 1.x allows remote attackers to execute arbitrary SQL commands via the bid parameter.
|
[
"cpe:2.3:a:unique_ads:unique_ads:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-rg2x-vfx2-2h76
|
Multiple cross-site scripting (XSS) vulnerabilities in Serendipity 0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) templatedropdown and (2) shoutbox plugins.
|
[] | null | null | null | null | null |
|
GHSA-qwf4-gh23-f5jj
|
Debian-edu-config all versions < 2.11.10, a set of configuration files used for Debian Edu, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other Kerberos user principals.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-1594
|
Cisco Identity Services Engine Privilege Escalation Vulnerability
|
A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes.
|
[
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4\\(0.902\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6\\(0.156\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7\\(0.903\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0\\(0.458\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1\\(0.440\\):*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-9279
|
funnyzpc Mee-Admin User Center index cross site scripting
|
A vulnerability, which was classified as problematic, was found in funnyzpc Mee-Admin up to 1.6. This affects an unknown part of the file /mee/index of the component User Center. The manipulation of the argument User Nickname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:funnyzpc:mee-admin:*:*:*:*:*:*:*:*"
] | 5.1 | 2.4 | 2.4 | 3.3 | null |
CVE-2006-1245
|
Buffer overflow in mshtml.dll in Microsoft Internet Explorer 6.0.2900.2180, and probably other versions, allows remote attackers to execute arbitrary code via an HTML tag with a large number of script action handlers such as onload and onmouseover, as demonstrated using onclick, aka the "Multiple Event Handler Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-2824
|
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
|
[
"cpe:2.3:a:zabbix:zabbix:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:2.4.9:rc1:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 | null |
|
CVE-2009-2123
|
Multiple SQL injection vulnerabilities in Elvin 1.2.0 allow remote attackers to execute arbitrary SQL commands via the (1) inUser (aka Username) and (2) inPass (aka Password) parameters to (a) inc/login.ei, reachable through login.php; and the (3) id parameter to (b) show_bug.php and (c) show_activity.php. NOTE: it was later reported that vector 3c also affects 1.2.2.
|
[
"cpe:2.3:a:elvinbts:elvinbts:1.2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-51062
|
An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command.
|
[
"cpe:2.3:a:qstar:archive_storage_manager:3-0:build7_patch0:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-rrq6-gq4w-89r8
|
Windows Kernel Elevation of Privilege Vulnerability
|
[] | null | 7 | null | null | null |
|
CVE-2017-17417
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Acknowledge method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4228.
|
[
"cpe:2.3:a:quest:netvault_backup:11.3.0.12:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-fxvx-gfmr-5xfj
|
Koillection Cross Site Scripting vulnerability
|
Cross Site Scripting vulnerability in Koillection v.1.6.10 allows a remote attacker to escalate privileges via the collection, Wishlist and album components
|
[] | null | 6.1 | null | null | null |
GHSA-c842-547h-7gp8
|
An issue in the HuginBase::PanoramaMemento::loadPTScript function of Hugin v2022.0.0 allows attackers to cause a heap buffer overflow via parsing a crafted image.
|
[] | null | 7.8 | null | null | null |
|
GHSA-w8hg-4qvm-86wh
|
Member_ProfileForm in security/Member.php in SilverStripe 2.3.x before 2.3.7 allows remote attackers to hijack user accounts by saving data using the email address (ID) of another user.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.