id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2023-24493
A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could leverage the reporting system to export reports containing formulas, which would then require a victim to approve and execute on a host.
[ "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*" ]
null
5.7
null
null
null
GHSA-5q48-fg3x-vgw2
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
[]
null
7.8
null
null
null
GHSA-35hx-486g-2hpc
An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges.
[]
null
null
6.7
null
null
CVE-2014-9300
Cross-site request forgery (CSRF) vulnerability in the cmisbrowser servlet in Content Management Interoperability Service (CMIS) in Alfresco Community Edition before 5.0.a allows remote attackers to hijack the authentication of users for requests that access unauthorized URLs and obtain user credentials via a URL in the url parameter.
[ "cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:*" ]
null
null
null
6.8
null
CVE-2022-36017
Segfault in `Requantize` in TensorFlow
TensorFlow is an open source platform for machine learning. If `Requantize` is given `input_min`, `input_max`, `requested_output_min`, `requested_output_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*" ]
null
5.9
null
null
null
GHSA-mxr3-8whj-j74r
Harden-Runner allows evasion of 'disable-sudo' policy
SummaryHarden-Runner includes a policy option `disable-sudo` to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction.For an attacker to bypass this control, they would first need the ability to run their malicious code (e.g., by a supply chain attack similar to tj-actions or exploiting a Pwn Request vulnerability)) on the runner. This vulnerability has been fixed in Harden-Runner version `v2.12.0`.ImpactAn attacker with the ability to run their malicious code on a runner configured with `disable-sudo: true` can escalate privileges to root using Docker, defeating the intended security control.Affected Configuration• Harden-Runner configurations that use `disable-sudo: true` on GitHub-hosted runners or on ephemeral self-hosted VM-based runners. • This issue does not apply to Kubernetes-based Actions Runner Controller (ARC) Harden-Runner.Mitigation / FixThis vulnerability has been fixed in Harden-Runner version `v2.12.0`. Users should migrate to the stronger `disable-sudo-and-containers` policy. This setting: • Disables sudo access, • Removes access to dockerd and containerd sockets, • Uninstalls Docker from the runner entirely, preventing container-based privilege escalation paths.Additional Improvements• The `disable-sudo` option will be deprecated in the future, as it does not sufficiently restrict privilege escalation on its own. • Harden-Runner now includes detections to alert on attempts to evade the `disable-sudo` policy.CreditsReported by @loresuso and @darryk10. We would like to thank them for collaborating with us to mitigate the vulnerability.
[]
null
6
null
null
null
CVE-2013-1917
Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
[ "cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*" ]
null
null
null
1.9
null
CVE-2017-8192
FusionSphere OpenStack V100R006C00 has an improper authorization vulnerability. Due to improper authorization, an attacker with low privilege may exploit this vulnerability to obtain the operation authority of some specific directory, causing privilege escalation.
[ "cpe:2.3:o:huawei:fusionsphere_openstack:v100r006c00:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2019-1649
Cisco Secure Boot Hardware Tampering Vulnerability
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
[ "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*", "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*", "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*", "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*", "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*" ]
null
null
6.7
null
null
GHSA-f3vw-hmc2-2j8x
VMware Workstation 8.x before 8.0.4, VMware Player 4.x before 4.0.4, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow remote attackers to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device.
[]
null
null
null
null
null
CVE-2006-5778
ftpd in linux-ftpd 0.17, and possibly other versions, performs a chdir before setting the UID, which allows local users to bypass intended access restrictions by redirecting their home directory to a restricted directory.
[ "cpe:2.3:a:linux-ftpd-ssl:linux-ftpd-ssl:0.17:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-22jm-p2vv-j2hc
Plone XSS
z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request.
[]
5.3
null
6.1
null
null
GHSA-587f-4vmq-c6m5
A vulnerability in one of the diagnostic test CLI commands of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker would need to have valid user credentials at privilege level 15. This vulnerability exists because the affected software permits modification of the run-time memory of an affected device under specific circumstances. An attacker could exploit this vulnerability by authenticating to the affected device and issuing a specific diagnostic test command at the CLI. A successful exploit could trigger a logic error in the code that was designed to restrict run-time memory modifications. The attacker could take advantage of this logic error to overwrite system memory locations and execute arbitrary code on the underlying Linux operating system (OS) of the affected device.
[]
null
null
null
null
null
GHSA-7f28-cgvx-h2cg
Nifty-PM CPE 2.3 is affected by stored HTML injection. The impact is remote arbitrary code execution.
[]
null
null
null
null
null
GHSA-pp4w-g5p4-85p2
phpMyFAQ Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
[]
null
null
9
null
null
GHSA-5hv5-8328-hrj4
Weak Authentication vulnerability in AresIT WP Compress allows Authentication Abuse. This issue affects WP Compress: from n/a through 6.30.30.
[]
null
5.3
null
null
null
CVE-2017-0604
An elevation of privilege vulnerability in the kernel Qualcomm power driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-35392981. References: QC-CR#826589.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
cisco-sa-20180620-fx-os-cli-execution
Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerability
A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packet headers when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could allow the attacker to execute arbitrary code or cause a DoS condition on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-cli-execution ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-cli-execution"] This advisory is part of the June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection, which includes 24 Cisco Security Advisories that describe 24 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-67770"].
[]
null
null
9.8
null
null
CVE-2024-23663
An improper access control in Fortinet FortiExtender 4.1.1 - 4.1.9, 4.2.0 - 4.2.6, 5.3.2, 7.0.0 - 7.0.4, 7.2.0 - 7.2.4 and 7.4.0 - 7.4.2 allows an attacker to create users with elevated privileges via a crafted HTTP request.
[ "cpe:2.3:h:fortinet:fortiextender:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-5c2r-7vmq-r33f
A Cross-Site Scripting (XSS) vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. The vulnerability allows remote attackers to inject arbitrary JavaScript code via the fromdate and todate parameters.
[]
null
6.1
null
null
null
GHSA-fjq5-p3q6-fjxc
Windows GDI+ Information Disclosure Vulnerability.
[]
null
5.5
null
null
null
CVE-2008-3093
Unrestricted file upload vulnerability in ImperialBB 2.3.5 and earlier allows remote authenticated users to upload and execute arbitrary PHP code by placing a .php filename in the Upload_Avatar parameter and sending the image/gif content type.
[ "cpe:2.3:a:phplizardo:imperialbb:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2022-25301
Prototype Pollution
All versions of package jsgui-lang-essentials are vulnerable to Prototype Pollution due to allowing all Object attributes to be altered, including their magical attributes such as proto, constructor and prototype.
[ "cpe:2.3:a:jsgui-lang-essentials_project:jsgui-lang-essentials:*:*:*:*:*:*:*:*" ]
null
7.7
null
null
null
CVE-2015-8742
The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2016-10306
Trango Altum AC600 devices have a built-in, hidden root account, with a default password of abcd1234. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
[ "cpe:2.3:o:trango:a600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:trango:a600-19-us:-:*:*:*:*:*:*:*", "cpe:2.3:h:trango:a600-25-us:-:*:*:*:*:*:*:*", "cpe:2.3:h:trango:a600-ext-us:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-w7g4-p5vp-3m77
The Smooth Gallery Replacement WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[]
null
6.1
null
null
null
CVE-2024-58000
io_uring: prevent reg-wait speculations
In the Linux kernel, the following vulnerability has been resolved: io_uring: prevent reg-wait speculations With *ENTER_EXT_ARG_REG instead of passing a user pointer with arguments for the waiting loop the user can specify an offset into a pre-mapped region of memory, in which case the [offset, offset + sizeof(io_uring_reg_wait)) will be intepreted as the argument. As we address a kernel array using a user given index, it'd be a subject to speculation type of exploits. Use array_index_nospec() to prevent that. Make sure to pass not the full region size but truncate by the maximum offset allowed considering the structure size.
[]
null
null
null
null
null
RHSA-2006:0164
Red Hat Security Advisory: mod_auth_pgsql security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
CVE-2005-4609
index.php in BugPort 1.147 and earlier allows remote attackers to obtain sensitive information such as full path and system configuration via an invalid action parameter.
[ "cpe:2.3:a:incogen:bugport:1.039:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.041:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.042:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.043:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.044:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.045:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.046:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.047:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.048:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.049:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.050:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.052:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.053:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.054:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.055:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.056:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.057:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.058:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.059:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.061:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.062:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.063:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.064:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.065:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.066:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.067:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.068:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.069:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.071:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.072:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.073:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.074:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.075:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.076:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.077:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.078:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.079:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.081:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.082:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.083:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.084:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.085:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.086:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.087:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.088:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.089:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.091:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.092:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.093:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.094:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.095:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.096:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.097:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.098:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.099:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.101:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.102:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.103:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.104:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.105:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.106:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.107:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.108:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.109:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.111:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.112:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.113:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.114:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.115:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.116:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.117:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.118:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.119:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.121:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.122:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.123:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.124:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.125:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.126:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.127:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.128:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.129:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.131:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.132:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.133:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.134:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.135:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.136:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.137:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.138:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.139:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.141:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.142:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.143:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.144:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.145:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.146:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.147:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2011-3520
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect integrity via unknown vectors related to Personalization.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*" ]
null
null
null
2.8
null
CVE-2010-1841
Disk Images in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted UDIF image.
[ "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-w656-prjj-5pfc
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 Cumulative Update 8 and 9 allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, aka "Exchange Spoofing Vulnerability."
[]
null
null
null
null
null
GHSA-9999-48p6-pf3h
Direct static code injection vulnerability in admin_config.php in NavBoard 2.6.0 allows remote attackers to inject arbitrary PHP code into data/config.php via multiple parameters, as demonstrated via the threadperpage parameter in an editconfig action.
[]
null
null
null
null
null
GHSA-574h-82r6-g95w
Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access.
[]
null
null
null
null
null
GHSA-rpp2-qjhg-737g
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.
[]
null
null
null
null
null
CVE-2005-2818
Cross-site scripting (XSS) vulnerability in DownFile 1.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter to (1) email.php,(2) index.php, (3) del.php, or (4) add_form.php.
[ "cpe:2.3:a:eric_fichot:downfile:1.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-6836
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
[ "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:enterprise_integrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server_as_key_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:micro_integrator:1.0.0:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
GHSA-jhv9-9wc2-f5gg
Quick Heal Total Security before 12.1.1.27 allows DLL hijacking during installation.
[]
null
7.3
null
null
null
CVE-2024-7176
TOTOLINK A3600R cstecgi.cgi setIpQosRules buffer overflow
A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This issue affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument comment leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272597 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
GHSA-wh5p-mjrq-677v
Cross-site scripting (XSS) vulnerability in Tiny Server 1.1 allows remote attackers to inject arbitrary web script or HTML via the URL.
[]
null
null
null
null
null
CVE-2025-29792
Microsoft Office Elevation of Privilege Vulnerability
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
[]
null
7.3
null
null
null
CVE-2021-34432
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
[ "cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-gw4x-f295-2jpv
The Bulk Posts Editing For WordPress plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 4.2.3. This makes it possible for authenticated attackers, with subscriber access and higher, to invoke their corresponding functions. This may lead to post creation and duplication, post content retrieval, post taxonomy manipulation.
[]
null
4.3
null
null
null
GHSA-vvcq-rjcr-qmw3
A vulnerability in the web-based management interface of Cisco AppDynamics Controller Software could allow an unauthenticated, remote attacker to access a configuration file and the login page for an administrative console that they would not normally have authorization to access. This vulnerability is due to improper authorization checking for HTTP requests that are submitted to the affected web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected instance of AppDynamics Controller. A successful exploit could allow the attacker to access the login page for an administrative console. AppDynamics has released software updates that address this vulnerability.
[]
null
5.3
null
null
null
GHSA-jwqv-7235-h9p6
A CSRF vulnerability in Settings form in the Custom Simple Rss plugin 2.0.6 for WordPress allows attackers to change the plugin settings.
[]
null
null
6.5
null
null
GHSA-m33x-x226-28fw
The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().
[]
null
null
9.8
null
null
CVE-2023-3966
Openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet
A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath", "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "cpe:/o:redhat:enterprise_linux:9::fastdatapath", "cpe:/o:redhat:enterprise_linux:7", "cpe:/a:redhat:openshift:3.11" ]
null
7.5
null
null
null
GHSA-832g-3rcm-wcrf
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
[]
8.4
8.8
null
null
null
GHSA-5ch3-2r78-59w3
Cross-site scripting (XSS) vulnerability in Trend Micro Control Manager (TMCM) 3.5 allows remote attackers to inject arbitrary web script or HTML via the username field on the login page, which is not properly sanitized before being displayed in the error log.
[]
null
null
null
null
null
GHSA-r87f-6gjw-683p
Cross-site scripting (XSS) vulnerability in guestbook.cfm in aXentGuestbook 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the startrow parameter.
[]
null
null
null
null
null
CVE-2019-10439
A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier in various 'doFillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:crx_content_package_deployer:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4
null
CVE-2005-3648
Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.
[ "cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2018-4925
Adobe Digital Editions versions 4.5.7 and below have an exploitable Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2025-55164
content-security-policy-parser Prototype Pollution Vulnerability May Lead to RCE
content-security-policy-parser parses content security policy directives. A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if a policy name is called __proto__, one can override the Object prototype. This issue has been patched in version 0.6.0. A workaround involves disabling prototype method in NodeJS, neutralizing all possible prototype pollution attacks. Provide either --disable-proto=delete (recommended) or --disable-proto=throw as an argument to node to enable this feature.
[]
8.8
null
null
null
null
GHSA-jfvx-7wrx-43fh
XStream vulnerable to an Arbitrary File Deletion on the local host when unmarshalling
ImpactThe vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.WorkaroundsThe reported vulnerability does only exist with a JAX-WS runtime on the classpath.No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.Users of XStream 1.4.14 can simply add two lines to XStream's setup code:Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[]
null
6.8
null
null
null
CVE-2015-1500
Multiple stack-based buffer overflows in the TSUnicodeGraphEditorControl in SolarWinds Server and Application Monitor (SAM) allow remote attackers to execute arbitrary code via unspecified vectors to (1) graphManager.load or (2) factory.load.
[ "cpe:2.3:a:solarwinds:server_and_application_monitor:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2023-50761
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird < 115.6.
[ "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2025-32019
Harbor's repository description page allows for XSS
Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.
[]
null
4.1
null
null
null
GHSA-7599-fqgm-v84p
rgb2hex vulnerable to inefficient regular expression complexity
A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 can address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151.
[]
null
7.5
null
null
null
CVE-2024-34650
Incorrect authorization in CocktailbarService prior to SMR Sep-2024 Release 1 allows local attackers to access privileged APIs related to Edge panel.
[ "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
null
4
null
null
null
GHSA-73wp-hmmc-88j6
No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.
[]
null
null
null
null
null
GHSA-9x2h-wwhr-53vp
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2020-28470
Cross-site Scripting (XSS)
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
[ "cpe:2.3:a:scully:scully:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
GHSA-45j6-22mm-5x5p
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
null
null
null
null
null
CVE-2025-27519
Cognita Arbitrary File Write
Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243.
[]
9.3
null
null
null
null
CVE-2023-29861
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
[ "cpe:2.3:o:flir:dvtel_camera_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:flir:dvtel_camera:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-rpqx-wxvq-jh8m
A vulnerability was found in Campcodes Online Job Finder System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/user/index.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257371.
[]
null
6.3
null
null
null
CVE-2008-6574
Unspecified vulnerability in SIP Enablement Services (SES) in Avaya Communication Manager 3.1.x and 4.x allows remote attackers to gain privileges and cause a denial of service via unknown vectors related to reuse of valid credentials.
[ "cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.4:sp2:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.5:sp0:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.1:sp15215:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.1:sp15500:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-48264
WordPress Product Code for WooCommerce plugin <= 1.5.0 - CSRF to Database Update vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in artiosmedia Product Code for WooCommerce allows Cross Site Request Forgery. This issue affects Product Code for WooCommerce: from n/a through 1.5.0.
[]
null
4.3
null
null
null
GHSA-6pqm-pp65-mc26
Jenkins Gem Publisher Plugin stores credentials as plaintext
Jenkins Gem Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
[]
null
5.5
null
null
null
CVE-2008-1741
The SIP Proxy (SIPD) service in Cisco Unified Presence before 6.0(3) allows remote attackers to cause a denial of service (core dump and service interruption) via a TCP port scan, aka Bug ID CSCsj64533.
[ "cpe:2.3:a:cisco:unified_presence:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_presence:6.0_1:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-pq4x-3x8p-gchv
The Microsoft (1) VBScript and (2) JScript engines, as used in Internet Explorer 8 through 11, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
[]
null
null
null
null
null
GHSA-gpj3-j69j-737p
Dell Rugged Control Center, version prior to 4.7, contains an Improper Access Control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder when product installation repair is performed, leading to privilege escalation on the system.
[]
null
7.3
null
null
null
CVE-2015-5551
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2003:234
Red Hat Security Advisory: : Updated semi packages fix vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
null
CVE-2010-3218
Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability."
[ "cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2024-36554
Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me KW-60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b allow a malicious user to gain information about the device by sending an SMS to the device which returns sensitive information.
[]
null
9.8
null
null
null
CVE-2025-46716
Sandboxie Arbitrary Kernel Read in SbieDrv.sys API (API_SET_SECURE_PARAM)
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_SetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to read from. SetRegValue then reads an arbitrary address, which can be a kernel pointer, into a HKLM Security SBIE registry value. This can later be retrieved by API_GET_SECURE_PARAM. Version 1.15.12 fixes the issue.
[]
null
5.5
null
null
null
CVE-2008-0454
Cross-zone scripting vulnerability in the Internet Explorer web control in Skype 3.6.0.244, and earlier 3.5.x and 3.6.x versions, on Windows allows user-assisted remote attackers to inject arbitrary web script or HTML in the Local Machine Zone via the Title field of a (1) Dailymotion and possibly (2) Metacafe movie in the Skype video gallery, accessible through a search within the "Add video to chat" dialog, aka "videomood XSS."
[ "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:*:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:3.6:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-77p2-mfp5-w993
Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database.
[]
null
9.8
null
null
null
GHSA-q8pj-j655-jvgv
Missing Authorization vulnerability in themifyme Themify Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Themify Builder: from n/a through 7.6.7.
[]
null
4.3
null
null
null
GHSA-crr2-q8mf-w298
Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
[]
null
null
null
null
null
GHSA-f43j-xw4p-q9wr
The WP Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 7.0.5 does not properly escape some of its shortcodes attributes before they are echoed back to users, making it possible for users with the contributor role to conduct Stored XSS attacks.
[]
null
5.4
null
null
null
CVE-2021-46145
The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking. This is related to a non-expiring rolling code and counter resynchronization.
[ "cpe:2.3:h:honda:civic_2012:-:*:*:*:*:*:*:*" ]
null
5.3
null
2.9
null
CVE-2025-49432
WordPress Ultimate Video Player Plugin <= 10.1 - Broken Access Control Vulnerability
Missing Authorization vulnerability in FWDesign Ultimate Video Player allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ultimate Video Player: from n/a through 10.1.
[]
null
5.3
null
null
null
CVE-2017-18277
When dynamic memory allocation fails, currently the process sleeps for one second and continues with infinite loop without retrying for memory allocation in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, QCN5502, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5502_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
null
GHSA-67gp-34xw-p93j
Google Chrome before 7.0.517.44 does not properly handle the data types of event objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
null
9.8
null
null
null
CVE-2021-20850
PowerCMS XMLRPC API of PowerCMS 5.19 and earlier, PowerCMS 4.49 and earlier, PowerCMS 3.295 and earlier, and PowerCMS 2 Series (End-of-Life, EOL) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
[ "cpe:2.3:a:alfasado:powercms:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-mjwj-f677-6xqx
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
[]
null
null
null
null
null
GHSA-6v9v-3f4c-cjgx
Untrusted Search Path in PostgreSQL
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
[]
null
7.3
null
null
null
CVE-2006-1891
Cross-site scripting (XSS) vulnerability in Martin Scheffler betaboard 0.1 allows remote attackers to inject arbitrary web script or HTML via a user's profile, possibly using the FormVal_profile parameter. NOTE: it is not clear whether this is a distributable product or a site-specific vulnerability. If it is site-specific, then it should not be included in CVE.
[ "cpe:2.3:a:betaboard:betaboard:0.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-41056
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files Use strnlen() instead of strlen() on the algorithm and coefficient name string arrays in V1 wmfw files. In V1 wmfw files the name is a NUL-terminated string in a fixed-size array. cs_dsp should protect against overrunning the array if the NUL terminator is missing.
[]
null
null
null
null
null
CVE-2014-7714
The ibon (aka tw.net.pic.mobi) application 3.2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:ibon:ibon:3.2.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-v3c8-h936-vqgh
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
[]
null
9.8
null
null
null
GHSA-5m9p-467q-w4wp
The Ins_IP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document.
[]
null
null
7.8
null
null
CVE-2012-5356
The apt-add-repository tool in Ubuntu Software Properties 0.75.x before 0.75.10.3, 0.80.x before 0.80.9.2, 0.81.x before 0.81.13.5, 0.82.x before 0.82.7.3, and 0.92.x before 0.92.8 does not properly check PPA GPG keys imported from a keyserver, which allows remote attackers to install arbitrary package repository GPG keys via a man-in-the-middle (MITM) attack.
[ "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.4:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.5:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.6:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.7:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.8:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.9:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.10:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.75.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.3:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.4:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.5:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.6:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.7:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.8:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.9:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.80.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.1:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.3:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.4:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.5:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.6:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.7:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.8:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.9:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.10:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.11:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.81.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.3:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.4:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.5:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.6:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.7:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.82.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92.2:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92.3:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92.4:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92.5:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92.6:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:ubuntu_software_properties:0.92.7:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2023-32018
Windows Hello Remote Code Execution Vulnerability
Windows Hello Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*" ]
null
7.8
null
null
null
CVE-2017-12923
OLEStream::WriteVT_LPSTR in olestrm.cpp in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted fpx image.
[ "cpe:2.3:a:libfpx_project:libfpx:1.3.1:p6:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2022-21996
Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*" ]
null
7.8
null
null
null
CVE-2008-7192
Cross-site request forgery (CSRF) vulnerability in index.php in WoltLab Burning Board (wBB) 3.0.1, and possibly other 3.x versions, allows remote attackers to hijack the authentication of users for requests that delete private messages via the pmID parameter in a delete action in a PM page, a different vulnerability than CVE-2008-0472.
[ "cpe:2.3:a:woltlab:burning_board:3.0.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null