id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2023-24493
|
A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could leverage the reporting system to export reports containing formulas, which would then require a victim to approve and execute on a host.
|
[
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null |
|
GHSA-5q48-fg3x-vgw2
|
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
[] | null | 7.8 | null | null | null |
|
GHSA-35hx-486g-2hpc
|
An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges.
|
[] | null | null | 6.7 | null | null |
|
CVE-2014-9300
|
Cross-site request forgery (CSRF) vulnerability in the cmisbrowser servlet in Content Management Interoperability Service (CMIS) in Alfresco Community Edition before 5.0.a allows remote attackers to hijack the authentication of users for requests that access unauthorized URLs and obtain user credentials via a URL in the url parameter.
|
[
"cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-36017
|
Segfault in `Requantize` in TensorFlow
|
TensorFlow is an open source platform for machine learning. If `Requantize` is given `input_min`, `input_max`, `requested_output_min`, `requested_output_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-mxr3-8whj-j74r
|
Harden-Runner allows evasion of 'disable-sudo' policy
|
SummaryHarden-Runner includes a policy option `disable-sudo` to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction.For an attacker to bypass this control, they would first need the ability to run their malicious code (e.g., by a supply chain attack similar to tj-actions or exploiting a Pwn Request vulnerability)) on the runner. This vulnerability has been fixed in Harden-Runner version `v2.12.0`.ImpactAn attacker with the ability to run their malicious code on a runner configured with `disable-sudo: true` can escalate privileges to root using Docker, defeating the intended security control.Affected Configuration• Harden-Runner configurations that use `disable-sudo: true` on GitHub-hosted runners or on ephemeral self-hosted VM-based runners.
• This issue does not apply to Kubernetes-based Actions Runner Controller (ARC) Harden-Runner.Mitigation / FixThis vulnerability has been fixed in Harden-Runner version `v2.12.0`. Users should migrate to the stronger `disable-sudo-and-containers` policy. This setting:
• Disables sudo access,
• Removes access to dockerd and containerd sockets,
• Uninstalls Docker from the runner entirely, preventing container-based privilege escalation paths.Additional Improvements• The `disable-sudo` option will be deprecated in the future, as it does not sufficiently restrict privilege escalation on its own.
• Harden-Runner now includes detections to alert on attempts to evade the `disable-sudo` policy.CreditsReported by @loresuso and @darryk10. We would like to thank them for collaborating with us to mitigate the vulnerability.
|
[] | null | 6 | null | null | null |
CVE-2013-1917
|
Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
|
[
"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2017-8192
|
FusionSphere OpenStack V100R006C00 has an improper authorization vulnerability. Due to improper authorization, an attacker with low privilege may exploit this vulnerability to obtain the operation authority of some specific directory, causing privilege escalation.
|
[
"cpe:2.3:o:huawei:fusionsphere_openstack:v100r006c00:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2019-1649
|
Cisco Secure Boot Hardware Tampering Vulnerability
|
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
|
[
"cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*",
"cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*",
"cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
"cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
"cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | null | null |
GHSA-f3vw-hmc2-2j8x
|
VMware Workstation 8.x before 8.0.4, VMware Player 4.x before 4.0.4, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow remote attackers to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device.
|
[] | null | null | null | null | null |
|
CVE-2006-5778
|
ftpd in linux-ftpd 0.17, and possibly other versions, performs a chdir before setting the UID, which allows local users to bypass intended access restrictions by redirecting their home directory to a restricted directory.
|
[
"cpe:2.3:a:linux-ftpd-ssl:linux-ftpd-ssl:0.17:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-22jm-p2vv-j2hc
|
Plone XSS
|
z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request.
|
[] | 5.3 | null | 6.1 | null | null |
GHSA-587f-4vmq-c6m5
|
A vulnerability in one of the diagnostic test CLI commands of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker would need to have valid user credentials at privilege level 15. This vulnerability exists because the affected software permits modification of the run-time memory of an affected device under specific circumstances. An attacker could exploit this vulnerability by authenticating to the affected device and issuing a specific diagnostic test command at the CLI. A successful exploit could trigger a logic error in the code that was designed to restrict run-time memory modifications. The attacker could take advantage of this logic error to overwrite system memory locations and execute arbitrary code on the underlying Linux operating system (OS) of the affected device.
|
[] | null | null | null | null | null |
|
GHSA-7f28-cgvx-h2cg
|
Nifty-PM CPE 2.3 is affected by stored HTML injection. The impact is remote arbitrary code execution.
|
[] | null | null | null | null | null |
|
GHSA-pp4w-g5p4-85p2
|
phpMyFAQ Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
|
[] | null | null | 9 | null | null |
GHSA-5hv5-8328-hrj4
|
Weak Authentication vulnerability in AresIT WP Compress allows Authentication Abuse. This issue affects WP Compress: from n/a through 6.30.30.
|
[] | null | 5.3 | null | null | null |
|
CVE-2017-0604
|
An elevation of privilege vulnerability in the kernel Qualcomm power driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-35392981. References: QC-CR#826589.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
cisco-sa-20180620-fx-os-cli-execution
|
Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerability
|
A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device.
The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packet headers when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could allow the attacker to execute arbitrary code or cause a DoS condition on the device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-cli-execution ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-cli-execution"]
This advisory is part of the June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection, which includes 24 Cisco Security Advisories that describe 24 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-67770"].
|
[] | null | null | 9.8 | null | null |
CVE-2024-23663
|
An improper access control in Fortinet FortiExtender 4.1.1 - 4.1.9, 4.2.0 - 4.2.6, 5.3.2, 7.0.0 - 7.0.4, 7.2.0 - 7.2.4 and 7.4.0 - 7.4.2 allows an attacker to create users with elevated privileges via a crafted HTTP request.
|
[
"cpe:2.3:h:fortinet:fortiextender:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-5c2r-7vmq-r33f
|
A Cross-Site Scripting (XSS) vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. The vulnerability allows remote attackers to inject arbitrary JavaScript code via the fromdate and todate parameters.
|
[] | null | 6.1 | null | null | null |
|
GHSA-fjq5-p3q6-fjxc
|
Windows GDI+ Information Disclosure Vulnerability.
|
[] | null | 5.5 | null | null | null |
|
CVE-2008-3093
|
Unrestricted file upload vulnerability in ImperialBB 2.3.5 and earlier allows remote authenticated users to upload and execute arbitrary PHP code by placing a .php filename in the Upload_Avatar parameter and sending the image/gif content type.
|
[
"cpe:2.3:a:phplizardo:imperialbb:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2022-25301
|
Prototype Pollution
|
All versions of package jsgui-lang-essentials are vulnerable to Prototype Pollution due to allowing all Object attributes to be altered, including their magical attributes such as proto, constructor and prototype.
|
[
"cpe:2.3:a:jsgui-lang-essentials_project:jsgui-lang-essentials:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
CVE-2015-8742
|
The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2016-10306
|
Trango Altum AC600 devices have a built-in, hidden root account, with a default password of abcd1234. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
|
[
"cpe:2.3:o:trango:a600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:trango:a600-19-us:-:*:*:*:*:*:*:*",
"cpe:2.3:h:trango:a600-25-us:-:*:*:*:*:*:*:*",
"cpe:2.3:h:trango:a600-ext-us:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-w7g4-p5vp-3m77
|
The Smooth Gallery Replacement WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-58000
|
io_uring: prevent reg-wait speculations
|
In the Linux kernel, the following vulnerability has been resolved:
io_uring: prevent reg-wait speculations
With *ENTER_EXT_ARG_REG instead of passing a user pointer with arguments
for the waiting loop the user can specify an offset into a pre-mapped
region of memory, in which case the
[offset, offset + sizeof(io_uring_reg_wait)) will be intepreted as the
argument.
As we address a kernel array using a user given index, it'd be a subject
to speculation type of exploits. Use array_index_nospec() to prevent
that. Make sure to pass not the full region size but truncate by the
maximum offset allowed considering the structure size.
|
[] | null | null | null | null | null |
RHSA-2006:0164
|
Red Hat Security Advisory: mod_auth_pgsql security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2005-4609
|
index.php in BugPort 1.147 and earlier allows remote attackers to obtain sensitive information such as full path and system configuration via an invalid action parameter.
|
[
"cpe:2.3:a:incogen:bugport:1.039:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.040:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.041:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.042:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.043:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.044:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.045:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.046:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.047:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.048:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.049:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.050:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.051:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.052:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.053:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.054:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.055:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.056:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.057:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.058:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.059:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.060:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.061:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.062:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.063:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.064:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.065:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.066:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.067:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.068:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.069:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.070:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.071:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.072:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.073:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.074:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.075:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.076:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.077:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.078:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.079:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.080:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.081:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.082:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.083:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.084:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.085:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.086:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.087:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.088:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.089:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.090:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.091:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.092:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.093:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.094:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.095:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.096:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.097:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.098:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.099:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.101:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.102:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.107:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.108:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.109:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.111:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.112:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.113:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.114:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.115:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.116:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.117:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.118:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.119:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.120:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.121:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.122:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.123:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.124:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.125:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.126:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.127:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.128:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.129:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.130:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.131:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.132:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.133:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.134:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.135:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.136:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.137:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.138:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.139:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.140:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.141:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.142:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.143:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.144:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.145:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.146:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.147:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2011-3520
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect integrity via unknown vectors related to Personalization.
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.49:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*"
] | null | null | null | 2.8 | null |
|
CVE-2010-1841
|
Disk Images in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted UDIF image.
|
[
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-w656-prjj-5pfc
|
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 Cumulative Update 8 and 9 allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, aka "Exchange Spoofing Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-9999-48p6-pf3h
|
Direct static code injection vulnerability in admin_config.php in NavBoard 2.6.0 allows remote attackers to inject arbitrary PHP code into data/config.php via multiple parameters, as demonstrated via the threadperpage parameter in an editconfig action.
|
[] | null | null | null | null | null |
|
GHSA-574h-82r6-g95w
|
Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access.
|
[] | null | null | null | null | null |
|
GHSA-rpp2-qjhg-737g
|
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.
|
[] | null | null | null | null | null |
|
CVE-2005-2818
|
Cross-site scripting (XSS) vulnerability in DownFile 1.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter to (1) email.php,(2) index.php, (3) del.php, or (4) add_form.php.
|
[
"cpe:2.3:a:eric_fichot:downfile:1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-6836
|
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
|
[
"cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:enterprise_integrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server_as_key_manager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:micro_integrator:1.0.0:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
|
GHSA-jhv9-9wc2-f5gg
|
Quick Heal Total Security before 12.1.1.27 allows DLL hijacking during installation.
|
[] | null | 7.3 | null | null | null |
|
CVE-2024-7176
|
TOTOLINK A3600R cstecgi.cgi setIpQosRules buffer overflow
|
A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This issue affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument comment leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272597 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 | null |
GHSA-wh5p-mjrq-677v
|
Cross-site scripting (XSS) vulnerability in Tiny Server 1.1 allows remote attackers to inject arbitrary web script or HTML via the URL.
|
[] | null | null | null | null | null |
|
CVE-2025-29792
|
Microsoft Office Elevation of Privilege Vulnerability
|
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.3 | null | null | null |
CVE-2021-34432
|
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
|
[
"cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-gw4x-f295-2jpv
|
The Bulk Posts Editing For WordPress plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 4.2.3. This makes it possible for authenticated attackers, with subscriber access and higher, to invoke their corresponding functions. This may lead to post creation and duplication, post content retrieval, post taxonomy manipulation.
|
[] | null | 4.3 | null | null | null |
|
GHSA-vvcq-rjcr-qmw3
|
A vulnerability in the web-based management interface of Cisco AppDynamics Controller Software could allow an unauthenticated, remote attacker to access a configuration file and the login page for an administrative console that they would not normally have authorization to access. This vulnerability is due to improper authorization checking for HTTP requests that are submitted to the affected web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected instance of AppDynamics Controller. A successful exploit could allow the attacker to access the login page for an administrative console. AppDynamics has released software updates that address this vulnerability.
|
[] | null | 5.3 | null | null | null |
|
GHSA-jwqv-7235-h9p6
|
A CSRF vulnerability in Settings form in the Custom Simple Rss plugin 2.0.6 for WordPress allows attackers to change the plugin settings.
|
[] | null | null | 6.5 | null | null |
|
GHSA-m33x-x226-28fw
|
The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-3966
|
Openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet
|
A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath",
"cpe:/o:redhat:enterprise_linux:8::fastdatapath",
"cpe:/o:redhat:enterprise_linux:9::fastdatapath",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/a:redhat:openshift:3.11"
] | null | 7.5 | null | null | null |
GHSA-832g-3rcm-wcrf
|
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček
from ESET.
|
[] | 8.4 | 8.8 | null | null | null |
|
GHSA-5ch3-2r78-59w3
|
Cross-site scripting (XSS) vulnerability in Trend Micro Control Manager (TMCM) 3.5 allows remote attackers to inject arbitrary web script or HTML via the username field on the login page, which is not properly sanitized before being displayed in the error log.
|
[] | null | null | null | null | null |
|
GHSA-r87f-6gjw-683p
|
Cross-site scripting (XSS) vulnerability in guestbook.cfm in aXentGuestbook 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the startrow parameter.
|
[] | null | null | null | null | null |
|
CVE-2019-10439
|
A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier in various 'doFillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
|
[
"cpe:2.3:a:jenkins:crx_content_package_deployer:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 | null |
|
CVE-2005-3648
|
Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.
|
[
"cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-4925
|
Adobe Digital Editions versions 4.5.7 and below have an exploitable Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2025-55164
|
content-security-policy-parser Prototype Pollution Vulnerability May Lead to RCE
|
content-security-policy-parser parses content security policy directives. A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if a policy name is called __proto__, one can override the Object prototype. This issue has been patched in version 0.6.0. A workaround involves disabling prototype method in NodeJS, neutralizing all possible prototype pollution attacks. Provide either --disable-proto=delete (recommended) or --disable-proto=throw as an argument to node to enable this feature.
|
[] | 8.8 | null | null | null | null |
GHSA-jfvx-7wrx-43fh
|
XStream vulnerable to an Arbitrary File Deletion on the local host when unmarshalling
|
ImpactThe vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.WorkaroundsThe reported vulnerability does only exist with a JAX-WS runtime on the classpath.No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.Users of XStream 1.4.14 can simply add two lines to XStream's setup code:Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
[] | null | 6.8 | null | null | null |
CVE-2015-1500
|
Multiple stack-based buffer overflows in the TSUnicodeGraphEditorControl in SolarWinds Server and Application Monitor (SAM) allow remote attackers to execute arbitrary code via unspecified vectors to (1) graphManager.load or (2) factory.load.
|
[
"cpe:2.3:a:solarwinds:server_and_application_monitor:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-50761
|
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird < 115.6.
|
[
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2025-32019
|
Harbor's repository description page allows for XSS
|
Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.
|
[] | null | 4.1 | null | null | null |
GHSA-7599-fqgm-v84p
|
rgb2hex vulnerable to inefficient regular expression complexity
|
A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 can address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151.
|
[] | null | 7.5 | null | null | null |
CVE-2024-34650
|
Incorrect authorization in CocktailbarService prior to SMR Sep-2024 Release 1 allows local attackers to access privileged APIs related to Edge panel.
|
[
"cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
GHSA-73wp-hmmc-88j6
|
No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.
|
[] | null | null | null | null | null |
|
GHSA-9x2h-wwhr-53vp
|
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-28470
|
Cross-site Scripting (XSS)
|
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
|
[
"cpe:2.3:a:scully:scully:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
GHSA-45j6-22mm-5x5p
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[] | null | null | null | null | null |
|
CVE-2025-27519
|
Cognita Arbitrary File Write
|
Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243.
|
[] | 9.3 | null | null | null | null |
CVE-2023-29861
|
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
|
[
"cpe:2.3:o:flir:dvtel_camera_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:flir:dvtel_camera:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-rpqx-wxvq-jh8m
|
A vulnerability was found in Campcodes Online Job Finder System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/user/index.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257371.
|
[] | null | 6.3 | null | null | null |
|
CVE-2008-6574
|
Unspecified vulnerability in SIP Enablement Services (SES) in Avaya Communication Manager 3.1.x and 4.x allows remote attackers to gain privileges and cause a denial of service via unknown vectors related to reuse of valid credentials.
|
[
"cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.4:sp2:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.5:sp0:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:sp15215:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:sp15500:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-48264
|
WordPress Product Code for WooCommerce plugin <= 1.5.0 - CSRF to Database Update vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in artiosmedia Product Code for WooCommerce allows Cross Site Request Forgery. This issue affects Product Code for WooCommerce: from n/a through 1.5.0.
|
[] | null | 4.3 | null | null | null |
GHSA-6pqm-pp65-mc26
|
Jenkins Gem Publisher Plugin stores credentials as plaintext
|
Jenkins Gem Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
|
[] | null | 5.5 | null | null | null |
CVE-2008-1741
|
The SIP Proxy (SIPD) service in Cisco Unified Presence before 6.0(3) allows remote attackers to cause a denial of service (core dump and service interruption) via a TCP port scan, aka Bug ID CSCsj64533.
|
[
"cpe:2.3:a:cisco:unified_presence:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_presence:6.0_1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-pq4x-3x8p-gchv
|
The Microsoft (1) VBScript and (2) JScript engines, as used in Internet Explorer 8 through 11, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-gpj3-j69j-737p
|
Dell Rugged Control Center, version prior to 4.7, contains an Improper Access Control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder when product installation repair is performed, leading to privilege escalation on the system.
|
[] | null | 7.3 | null | null | null |
|
CVE-2015-5551
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2003:234
|
Red Hat Security Advisory: : Updated semi packages fix vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null | null |
CVE-2010-3218
|
Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability."
|
[
"cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2024-36554
|
Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me KW-60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b allow a malicious user to gain information about the device by sending an SMS to the device which returns sensitive information.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-46716
|
Sandboxie Arbitrary Kernel Read in SbieDrv.sys API (API_SET_SECURE_PARAM)
|
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_SetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to read from. SetRegValue then reads an arbitrary address, which can be a kernel pointer, into a HKLM Security SBIE registry value. This can later be retrieved by API_GET_SECURE_PARAM. Version 1.15.12 fixes the issue.
|
[] | null | 5.5 | null | null | null |
CVE-2008-0454
|
Cross-zone scripting vulnerability in the Internet Explorer web control in Skype 3.6.0.244, and earlier 3.5.x and 3.6.x versions, on Windows allows user-assisted remote attackers to inject arbitrary web script or HTML in the Local Machine Zone via the Title field of a (1) Dailymotion and possibly (2) Metacafe movie in the Skype video gallery, accessible through a search within the "Add video to chat" dialog, aka "videomood XSS."
|
[
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:*:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:3.6:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-77p2-mfp5-w993
|
Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database.
|
[] | null | 9.8 | null | null | null |
|
GHSA-q8pj-j655-jvgv
|
Missing Authorization vulnerability in themifyme Themify Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Themify Builder: from n/a through 7.6.7.
|
[] | null | 4.3 | null | null | null |
|
GHSA-crr2-q8mf-w298
|
Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
|
[] | null | null | null | null | null |
|
GHSA-f43j-xw4p-q9wr
|
The WP Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 7.0.5 does not properly escape some of its shortcodes attributes before they are echoed back to users, making it possible for users with the contributor role to conduct Stored XSS attacks.
|
[] | null | 5.4 | null | null | null |
|
CVE-2021-46145
|
The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking. This is related to a non-expiring rolling code and counter resynchronization.
|
[
"cpe:2.3:h:honda:civic_2012:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 2.9 | null |
|
CVE-2025-49432
|
WordPress Ultimate Video Player Plugin <= 10.1 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in FWDesign Ultimate Video Player allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ultimate Video Player: from n/a through 10.1.
|
[] | null | 5.3 | null | null | null |
CVE-2017-18277
|
When dynamic memory allocation fails, currently the process sleeps for one second and continues with infinite loop without retrying for memory allocation in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, QCN5502, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835.
|
[
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 | null |
|
GHSA-67gp-34xw-p93j
|
Google Chrome before 7.0.517.44 does not properly handle the data types of event objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-20850
|
PowerCMS XMLRPC API of PowerCMS 5.19 and earlier, PowerCMS 4.49 and earlier, PowerCMS 3.295 and earlier, and PowerCMS 2 Series (End-of-Life, EOL) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
|
[
"cpe:2.3:a:alfasado:powercms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-mjwj-f677-6xqx
|
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
|
[] | null | null | null | null | null |
|
GHSA-6v9v-3f4c-cjgx
|
Untrusted Search Path in PostgreSQL
|
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
|
[] | null | 7.3 | null | null | null |
CVE-2006-1891
|
Cross-site scripting (XSS) vulnerability in Martin Scheffler betaboard 0.1 allows remote attackers to inject arbitrary web script or HTML via a user's profile, possibly using the FormVal_profile parameter. NOTE: it is not clear whether this is a distributable product or a site-specific vulnerability. If it is site-specific, then it should not be included in CVE.
|
[
"cpe:2.3:a:betaboard:betaboard:0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-41056
|
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
|
In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
Use strnlen() instead of strlen() on the algorithm and coefficient name
string arrays in V1 wmfw files.
In V1 wmfw files the name is a NUL-terminated string in a fixed-size
array. cs_dsp should protect against overrunning the array if the NUL
terminator is missing.
|
[] | null | null | null | null | null |
CVE-2014-7714
|
The ibon (aka tw.net.pic.mobi) application 3.2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:ibon:ibon:3.2.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-v3c8-h936-vqgh
|
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
|
[] | null | 9.8 | null | null | null |
|
GHSA-5m9p-467q-w4wp
|
The Ins_IP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document.
|
[] | null | null | 7.8 | null | null |
|
CVE-2012-5356
|
The apt-add-repository tool in Ubuntu Software Properties 0.75.x before 0.75.10.3, 0.80.x before 0.80.9.2, 0.81.x before 0.81.13.5, 0.82.x before 0.82.7.3, and 0.92.x before 0.92.8 does not properly check PPA GPG keys imported from a keyserver, which allows remote attackers to install arbitrary package repository GPG keys via a man-in-the-middle (MITM) attack.
|
[
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.75.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.80.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.11:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.82.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:ubuntu_software_properties:0.92.7:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2023-32018
|
Windows Hello Remote Code Execution Vulnerability
|
Windows Hello Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null | null |
CVE-2017-12923
|
OLEStream::WriteVT_LPSTR in olestrm.cpp in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted fpx image.
|
[
"cpe:2.3:a:libfpx_project:libfpx:1.3.1:p6:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2022-21996
|
Win32k Elevation of Privilege Vulnerability
|
Win32k Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null | null |
CVE-2008-7192
|
Cross-site request forgery (CSRF) vulnerability in index.php in WoltLab Burning Board (wBB) 3.0.1, and possibly other 3.x versions, allows remote attackers to hijack the authentication of users for requests that delete private messages via the pmID parameter in a delete action in a PM page, a different vulnerability than CVE-2008-0472.
|
[
"cpe:2.3:a:woltlab:burning_board:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.