id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
CVE-2017-11257
|
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable type confusion vulnerability in the XFA layout engine. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
CVE-2023-0527
|
PHPGurukul Online Security Guards Hiring System search-request.php cross site scripting
|
A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file search-request.php. The manipulation of the argument searchdata with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219596.
|
[
"cpe:2.3:a:online_security_guards_hiring_system_project:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
GHSA-vghm-8cjp-hjw6
|
postgraas-server vulnerable to SQL injection
|
A vulnerability, which was classified as critical, was found in Blue Yonder postgraas_server up to 2.0.0b2. Affected is the function `_create_pg_connection/create_postgres_db` of the file `postgraas_server/backends/postgres_cluster/postgres_cluster_driver.py` of the component PostgreSQL Backend Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 is able to address this issue. The patch is identified as 7cd8d016edc74a78af0d81c948bfafbcc93c937c. It is recommended to upgrade the affected component. VDB-234246 is the identifier assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
GHSA-5cmq-wrwp-9x26
|
An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.
|
[] | null | 7.1 | null | null | null |
|
GHSA-fwvg-vmq9-vfp5
|
Verba Collaboration Compliance and Quality Management Platform before 9.2.1.5545 has Incorrect Access Control.
|
[] | null | 6.5 | null | null | null |
|
GHSA-8jq6-hqmc-9q2h
|
statusnet before 0.9.9 has XSS
|
[] | null | null | null | null | null |
|
GHSA-rv8h-4qm2-8qhc
|
An XML External Entity Injection (XXE) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10. A remote attacker could exploit this vulnerability to expose sensitive information, denial of service, server side request forgery or consume memory resources. IBM X-Force ID: 189150.
|
[] | null | null | null | null | null |
|
CVE-2005-0789
|
Directory traversal vulnerability in LimeWire 3.9.6 through 4.6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in a magnet request.
|
[
"cpe:2.3:a:limewire:limewire:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:limewire:limewire:4.6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-3656
|
Out of bound access can happen in MHI command process due to lack of check of command channel id value received from MHI devices in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, Kamorta, MDM9607, MSM8917, MSM8953, Nicobar, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
|
[
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2024-53959
|
Adobe Framemaker | Stack-based Buffer Overflow (CWE-121)
|
Adobe Framemaker versions 2020.7, 2022.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2004-0597
|
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
|
[
"cpe:2.3:a:greg_roelofs:libpng:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:msn_messenger:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:msn_messenger:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_messenger:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:second_edition:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-40965
|
i2c: lpi2c: Avoid calling clk_get_rate during transfer
|
In the Linux kernel, the following vulnerability has been resolved:
i2c: lpi2c: Avoid calling clk_get_rate during transfer
Instead of repeatedly calling clk_get_rate for each transfer, lock
the clock rate and cache the value.
A deadlock has been observed while adding tlv320aic32x4 audio codec to
the system. When this clock provider adds its clock, the clk mutex is
locked already, it needs to access i2c, which in return needs the mutex
for clk_get_rate as well.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2019:3140
|
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.4.8 security update
|
thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands tika: Command injection in tika-server can allow remote attackers to execute arbitrary commands via crafted headers slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis thrift: Improper Access Control grants access to files outside the webservers docroot path jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class zookeeper: Information disclosure in Apache ZooKeeper
|
[
"cpe:/a:redhat:jboss_data_virtualization:6.4"
] | null | null | 7.5 | null | null |
CVE-2007-5846
|
The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.
|
[
"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2024-6862
|
Cross-Site Request Forgery (CSRF) in lunary-ai/lunary
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in lunary-ai/lunary version 1.2.34 due to overly permissive CORS settings. This vulnerability allows an attacker to sign up for and create projects or use the instance as if they were a user with local access. The main attack vector is for instances hosted locally on personal machines, which are not publicly accessible. The CORS settings in the backend permit all origins, exposing unauthenticated endpoints to CSRF attacks.
|
[
"cpe:2.3:a:lunary-ai:lunary-ai\\/lunary:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lunary:lunary:1.2.34:*:*:*:*:*:*:*"
] | null | null | 7.4 | null | null |
GHSA-9w8w-34vr-65j2
|
Reposilite artifacts vulnerable to Stored Cross-site Scripting
|
SummaryReposilite v3.5.10 is affected by Stored Cross-Site Scripting (XSS) when displaying artifact's content in the browser.DetailsAs a Maven repository manager, Reposilite provides the ability to view the artifacts content in the browser, as well as perform administrative tasks via API. The problem lies in the fact that the artifact's content is served via the same origin (protocol/host/port) as the Admin UI. If the artifact contains HTML content with javascript inside, the javascript is executed within the same origin. Therefore, if an authenticated user is viewing the artifacts content, the javascript inside can access the browser's local storage where the user's password (aka 'token-secret') is stored.
It is especially dangerous in scenarios where Reposilite is configured to mirror third party repositories, like the Maven Central Repository. Since anyone can publish an artifact to Maven Central under its own name, such malicious packages can be used to attack the Reposilite instance.Steps to reproduceTo demonstrate this vulnerability, we can start Reposilite with default settings at localhost:8080 and configure its 'release' repository to mirror https://artsploit.com/maven. This is my own website intended to emulate http://repo1.maven.org/, but it also contains a proof-of-concept payload for this vulnerability. Technically I could publish this payload to Maven Central Repository, but I don't want to clutter it.Then, as an administrator or authenticated Reposilite user, navigate to http://localhost:8080/releases/com/artsploit/reposilite-xss/1.0/reposilite-xss-1.0.pom in the browser.
This file contains the basic `application/xml` payload:The script will be executed within the http://localhost:8080/ origin and the leaked token is displayed.ImpactThis issue may lead to the full Reposilite instance compromise. If this attack is performed against the admin user, it's possible to use the admin API to modify settings and artifacts on the instance. In the worst case scenario, an attacker would be able to obtain the Remote code execution on all systems that use artifacts from Reposilite.It's important to note that the attacker does not need to lure a victim user to use a malicious artifact, but just open a link in the browser. This link can be silently loaded among the other HTML content, making this attack unnoticeable.Even if the Reposilite instance is located in an isolated environment, such as behind a VPN or in the local network, this attack is still possible as it can be performed from the admin browser.RemediationWhen serving artifact's content via HTTPS, it's important to understand that this content might be potentially untrusted HTML code, so the javascript execution should be restricted.
Consider the following options to remediate this vulnerability:[preferred] Use the "Content-Security-Policy: sandbox;" header when serving artifact's content. This makes the resource treated as being from a special origin that always fails the same-origin policy (potentially preventing access to data storage/cookies and some JavaScript APIs).[not preferred, but also works] Use the "Content-Disposition: attachment" header. This will prevent the browser from displaying the content entirely, so it just saves it to the local filesystem.Additionally, we strongly recommend reconsidering how the website authentication works for Reposilite. Storing user's passwords in plaintext in the browser's local storage is not an ideal option. The more robust and secure option would be to issue a one time session ID or a token to the browser after checking the login/password on the server. These session IDs or tokens should have limited validity time, so their compromise would be trickier to exploit.
|
[] | 7.7 | 7.5 | null | null | null |
GHSA-jgc9-5f5f-87mg
|
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-9799
|
SourceCodester Profile Registration without Reload Refresh add.php cross site scripting
|
A vulnerability has been found in SourceCodester Profile Registration without Reload Refresh 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file add.php. The manipulation of the argument email_address/address/company_name/job_title/jobDescriptionparameter leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:profile_registration_without_reload_refresh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rems:profile_registration_without_reload\\/refresh:1.0:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 | null |
cisco-sa-sdwan-vdaemon-bo-RuzzEA2
|
Cisco SD-WAN vDaemon Buffer Overflow Vulnerability
|
A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition.
The vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.4 | null | null | null |
CVE-2024-11015
|
Sign In With Google <= 1.8.0 - Authentication Bypass in authenticate_user
|
The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing sufficient null value checks when setting the access token and user information. This makes it possible for unauthenticated attackers to log in as the first user who has signed in using Google OAuth, which could be the site administrator.
|
[] | null | 9.8 | null | null | null |
GHSA-x8wf-fr8f-mvvp
|
Cross-site scripting (XSS) vulnerability in ajax-spell before 1.8 allows remote attackers to inject arbitrary web script or HTML via onmouseover or other events in HTML tags.
|
[] | null | null | null | null | null |
|
GHSA-xh9g-cqwj-6chj
|
SPBAS Business Automation Software 2012 has XSS.
|
[] | null | null | null | null | null |
|
GHSA-rppf-8vfg-phcr
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_800462c4 in /formAdvFirewall. This vulnerability is triggered via a crafted POST request.
|
[] | null | null | null | null | null |
|
CVE-2012-3793
|
Integer overflow in Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to cause a denial of service (daemon crash) via a crafted packet with a certain opcode that triggers an incorrect memory allocation and a buffer overflow.
|
[
"cpe:2.3:a:pro-face:pro-server_ex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pro-face:pro-server_ex:1.21.000:*:*:*:*:*:*:*",
"cpe:2.3:a:pro-face:pro-server_ex:1.23.000:*:*:*:*:*:*:*",
"cpe:2.3:a:pro-face:pro-server_ex:1.24.200:*:*:*:*:*:*:*",
"cpe:2.3:a:pro-face:wingp_pc_runtime:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-4586-3357-8wqx
|
Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)
|
[] | null | 7.3 | null | null | null |
|
GHSA-r3vc-752g-hj6w
|
Missing Authorization vulnerability in Automattic Jetpack Debug Tools.This issue affects Jetpack Debug Tools: from n/a before 2.0.1.
|
[] | null | 5.3 | null | null | null |
|
CVE-2019-2986
|
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: LLVM Interpreter). The supported version that is affected is 19.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*"
] | null | 7.7 | null | 4 | null |
|
CVE-2024-21026
|
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:12.2.3-12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-7859-p85p-46rv
|
A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37685267. References: B-V2017053102.
|
[] | null | null | 8.8 | null | null |
|
GHSA-8f95-9vr9-hxf2
|
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
|
[] | null | null | 6.5 | null | null |
|
RHSA-2019:1852
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 atomic-openshift security update
|
kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp`
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5.3 | null | null |
CVE-2024-39403
|
Stored XSS through Webhook module public key configuration
|
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Confidentiality impact is high due to the attacker being able to exfiltrate sensitive information.
|
[
"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*"
] | null | 7.6 | null | null | null |
ICSA-18-226-03
|
ICSA-18-226-03 Siemens Automation License Manager
|
A directory traversal vulnerability could allow a remote attacker to move arbitrary files, which can result in code execution, compromising confidentiality, integrity and availability of the system. Successful exploitation requires a network connection to the affected device. The attacker does not need privileges or special conditions of the system, but user interaction is required. At the time of advisory publication no public exploitation of this securtiy vulnerability was known. An attacker with network access to the device could send specially crafted network packets to determine whether or not a network port on another remote system is accessible or not. This allows the attacker to do basic network scanning using the victims machine. Successful exploitation requires a network connection to the affected device. The attacker does not need privileges, no user interaction is required. The impact is limited to determining whether or not a port on a target system is accessible by the affected device. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[] | null | null | 5.3 | null | null |
CVE-2006-3159
|
pipe_master in Sun ONE/iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003) allows local users to read portions of restricted files via a symlink attack on msg.conf in a directory identified by the CONFIGROOT environment variable, which returns the first line of the file in an error message.
|
[
"cpe:2.3:a:sun:iplanet_messaging_server:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:one_messaging_server:5.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-xgg6-7q2q-mcm5
|
VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 and the proxy client in EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x do not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-v9xx-v54p-m2hw
|
The Upload Media By URL WordPress plugin before 1.0.8 does not have CSRF check when uploading files, which could allow attackers to make logged in admins upload files (including HTML containing JS code for users with the unfiltered_html capability) on their behalf.
|
[] | null | 6.5 | null | null | null |
|
GHSA-9j9w-j934-v857
|
Kofax Power PDF PDF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22931.
|
[] | null | null | 7.8 | null | null |
|
GHSA-rqh2-3wvv-w2x4
|
Neocrome Seditio build 161 and earlier allows remote attackers to obtain sensitive information via direct request to (1) view.php, (2) plugins/contact/lang/contact.en.lang.php, (3) system/lang/en/main.lang.php, (4) system/lang/en/message.lang.php, or (5) system/core/view/view.inc.php, which reveals the installation path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-hrpc-fm5f-rg4v
|
Cross-site Scripting (XSS) vulnerability in the search functionality of AlCoda NetBiblio WebOPAC allows an unauthenticated user to craft a reflected Cross-Site Scripting attack. This issue affects: AlCoda NetBiblio WebOPAC versions prior to 4.0.0.320; versions later than 4.0.0.328. This issue does not affect: AlCoda NetBiblio WebOPAC version 4.0.0.335 and later versions.
|
[] | null | null | null | null | null |
|
GHSA-xxjm-jvw6-6mm7
|
NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service.
|
[] | null | 7.8 | null | null | null |
|
CVE-2008-2218
|
Buffer overflow in the Multimedia PC Client in Nortel Multimedia Communication Server (MCS) before Maintenance Release 3.5.8.3 and 4.0.25.3 allows remote attackers to cause a denial of service (crash) via a flood of "extraneous" messages, as demonstrated by the Nessus "Generic flood" denial of service plugin.
|
[
"cpe:2.3:a:nortel:multimedia_communications_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-v587-qwh9-6xx3
|
An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests.
|
[] | null | 9.9 | null | null | null |
|
CVE-2024-20772
|
Adobe Media Encoder 2024 AI file parsing Stack based buffer overflow
|
Media Encoder versions 24.2.1, 23.6.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-gp73-hc78-3ch8
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JoomUnited WP Meta SEO allows Stored XSS.This issue affects WP Meta SEO: from n/a through 4.5.13.
|
[] | null | 6.5 | null | null | null |
|
CVE-2017-0748
|
An information disclosure vulnerability in the Qualcomm audio driver. Product: Android. Versions: Android Kernel. Android ID: A-35764875. References: QC-CR#2029798.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-vwgx-54x2-gc6m
|
TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the cstecgi.cgi
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-36505
|
WordPress Ninja Forms Plugin <= 3.6.24 is vulnerable to Arbitrary File Deletion
|
Improper Input Validation vulnerability in Saturday Drive Ninja Forms Contact Form.This issue affects Ninja Forms Contact Form : from n/a through 3.6.24.
|
[] | null | 6.8 | null | null | null |
CVE-2021-42202
|
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function swf_DeleteFilter() located in swffilter.c. It allows an attacker to cause Denial of Service.
|
[
"cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2024-23765
|
An issue was discovered on HMS Anybus X-Gateway AB7832-F 3 devices. The gateway exposes an unidentified service on port 7412 on the network. All the network services of the gateway become unresponsive after sending 85 requests to this port. The content and length of the frame does not matter. The device needs to be restarted to resume operations.
|
[] | null | 4 | null | null | null |
|
CVE-2023-49757
|
WordPress Awesome Support plugin <= 6.1.10 - Broken Access Control + CSRF vulnerability
|
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.10.
|
[] | null | 5.4 | null | null | null |
GHSA-p3rx-3f5f-p375
|
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_task.php?id=.
|
[] | null | 7.2 | null | null | null |
|
GHSA-rgwg-h3hm-2qgw
|
Cross-site scripting (XSS) vulnerability in phpODP 1.5h allows remote attackers to inject arbitrary web script via the browse parameter.
|
[] | null | null | null | null | null |
|
ICSA-25-205-02
|
Network Thermostat X-Series WiFi Thermostats
|
The embedded web server on the thermostat listed version ranges contain a vulnerability that allows unauthenticated attackers, either on the Local Area Network or from the Internet via a router with port forwarding set up, to gain direct access to the thermostat's embedded web server and reset user credentials by manipulating specific elements of the embedded web interface.
|
[] | null | 9.8 | null | null | null |
RHSA-2023:4933
|
Red Hat Security Advisory: Logging Subsystem 5.7.6 - Red Hat OpenShift security update
|
openshift-logging: LokiStack authorisation is cached too broadly
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 5.7 | null | null | null |
GHSA-p4fp-9hj6-v2q6
|
K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x950025ac DeviceIoControl request.
|
[] | null | null | 9.8 | null | null |
|
CVE-2016-10913
|
The wp-latest-posts plugin before 3.7.5 for WordPress has XSS.
|
[
"cpe:2.3:a:joomunited:wp_latest_posts:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-v5qp-mx94-j49v
|
A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled.
This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
|
[] | null | 7.5 | null | null | null |
|
cisco-sa-3000-9000-fileaction-QtLzDRy2
|
Cisco NX-OS Software Unauthenticated Arbitrary File Actions Vulnerability
|
A vulnerability in the implementation of an internal file management service for Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode that are running Cisco NX-OS Software could allow an unauthenticated, remote attacker to create, delete, or overwrite arbitrary files with root privileges on the device.
This vulnerability exists because TCP port 9075 is incorrectly configured to listen and respond to external connection requests. An attacker could exploit this vulnerability by sending crafted TCP packets to an IP address that is configured on a local interface on TCP port 9075. A successful exploit could allow the attacker to create, delete, or overwrite arbitrary files, including sensitive files that are related to the device configuration. For example, the attacker could add a user account without the device administrator knowing.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74414"].
|
[] | null | 9.8 | null | null | null |
ICSA-22-342-03
|
Rockwell Automation Logix controllers
|
An unauthorized user could use a specially crafted sequence of Ethernet and IP messages and combine them with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers, resulting in a denial-of-service condition. If the target device becomes unavailable in this condition, a user would have to clear and redownload the user project file to bring the device back online.CVE-2022-3752 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
|
[] | null | null | 8.6 | null | null |
CVE-2023-23908
|
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2745nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2757nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2777nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2798nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*"
] | null | 6 | null | null | null |
|
GHSA-v4r8-cqvm-3hjq
|
Buffer overflow in Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-j37w-8jcg-6mcp
|
After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.
|
[] | null | 9.8 | null | null | null |
|
GHSA-h3x4-p749-hcqw
|
Cross-site scripting (XSS) vulnerability in default.asp for episodex guestbook allows remote attackers to inject arbitrary web script or HTML via the Name field and other fields.
|
[] | null | null | null | null | null |
|
CVE-2015-3740
|
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2024:8081
|
Red Hat Security Advisory: OpenIPMI security update
|
openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 5 | null | null | null |
GHSA-7fmw-f49w-wv7m
|
Tenda TX9 Pro 22.03.02.10 devices allow OS command injection via set_route (called by doSystemCmd_route).
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-46307
|
SGUDA U-Lock - Broken Access Control
|
SGUDA U-Lock central lock control service’s lock management function has incorrect authorization. A remote attacker with general privilege can exploit this vulnerability to call privileged APIs to acquire information, manipulate or disrupt the functionality of arbitrary electronic locks.
|
[
"cpe:2.3:o:sguda:u-lock_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sguda:u-lock:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2024-54539
|
This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to capture keyboard events from the lock screen.
|
[] | null | 5.5 | null | null | null |
|
GHSA-8j2c-qwhx-7qj4
|
IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.63 (aka 6.0.0.8-TIV-ITDS-IF0005) allows remote authenticated users to cause a denial of service (daemon crash or hang) via a paged search, as demonstrated by a certain idsldapsearch command, related to an improper ibm-slapdIdleTimeOut configuration setting.
|
[] | null | null | null | null | null |
|
GHSA-jpxh-mq89-hwp3
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, QCA4531, QCA6174A, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, QCA9558, QCA9880, QCA9886, QCA9980, SD 210/SD 212/SD 205, SD 425, SD 625, SD 808, SD 810, SD 820, and SDX20, while processing firmware image signature, the internal buffer may overflow if the firmware signature size is large.
|
[] | null | null | 9.8 | null | null |
|
GHSA-r4x6-pjr9-jh9r
|
Improper buffer restrictions in PlatformPfrDxe driver in UEFI firmware for some Intel(R) Server D50FCP Family products may allow a privileged user to enable escalation of privilege via local access.
|
[] | null | 7.5 | null | null | null |
|
GHSA-733v-mpm2-5g48
|
In the Linux kernel, the following vulnerability has been resolved:arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newerPrior to LLVM 15.0.0, LLVM's integrated assembler would incorrectly
byte-swap NOP when compiling for big-endian, and the resulting series of
bytes happened to match the encoding of FNMADD S21, S30, S0, S0.This went unnoticed until commit:34f66c4c4d5518c1 ("arm64: Use a positive cpucap for FP/SIMD")Prior to that commit, the kernel would always enable the use of FPSIMD
early in boot when __cpu_setup() initialized CPACR_EL1, and so usage of
FNMADD within the kernel was not detected, but could result in the
corruption of user or kernel FPSIMD state.After that commit, the instructions happen to trap during boot prior to
FPSIMD being detected and enabled, e.g.| Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000001fe00000 -- ASIMD
| CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.0-rc3-00013-g34f66c4c4d55 #1
| Hardware name: linux,dummy-virt (DT)
| pstate: 400000c9 (nZcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : __pi_strcmp+0x1c/0x150
| lr : populate_properties+0xe4/0x254
| sp : ffffd014173d3ad0
| x29: ffffd014173d3af0 x28: fffffbfffddffcb8 x27: 0000000000000000
| x26: 0000000000000058 x25: fffffbfffddfe054 x24: 0000000000000008
| x23: fffffbfffddfe000 x22: fffffbfffddfe000 x21: fffffbfffddfe044
| x20: ffffd014173d3b70 x19: 0000000000000001 x18: 0000000000000005
| x17: 0000000000000010 x16: 0000000000000000 x15: 00000000413e7000
| x14: 0000000000000000 x13: 0000000000001bcc x12: 0000000000000000
| x11: 00000000d00dfeed x10: ffffd414193f2cd0 x9 : 0000000000000000
| x8 : 0101010101010101 x7 : ffffffffffffffc0 x6 : 0000000000000000
| x5 : 0000000000000000 x4 : 0101010101010101 x3 : 000000000000002a
| x2 : 0000000000000001 x1 : ffffd014171f2988 x0 : fffffbfffddffcb8
| Kernel panic - not syncing: Unhandled exception
| CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.0-rc3-00013-g34f66c4c4d55 #1
| Hardware name: linux,dummy-virt (DT)
| Call trace:
| dump_backtrace+0xec/0x108
| show_stack+0x18/0x2c
| dump_stack_lvl+0x50/0x68
| dump_stack+0x18/0x24
| panic+0x13c/0x340
| el1t_64_irq_handler+0x0/0x1c
| el1_abort+0x0/0x5c
| el1h_64_sync+0x64/0x68
| __pi_strcmp+0x1c/0x150
| unflatten_dt_nodes+0x1e8/0x2d8
| __unflatten_device_tree+0x5c/0x15c
| unflatten_device_tree+0x38/0x50
| setup_arch+0x164/0x1e0
| start_kernel+0x64/0x38c
| __primary_switched+0xbc/0xc4Restrict CONFIG_CPU_BIG_ENDIAN to a known good assembler, which is
either GNU as or LLVM's IAS 15.0.0 and newer, which contains the linked
commit.
|
[] | null | null | null | null | null |
|
GHSA-w2qc-22jv-44g8
|
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.
This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.Users are recommended to upgrade to version 2.4.58, which fixes the issue.
|
[] | null | 7.5 | null | null | null |
|
GHSA-29f7-328x-f75h
|
Cross-site scripting (XSS) vulnerability in synnefoclient in Synnefo Internet Management Software (IMS) 2015 allows remote attackers to inject arbitrary web script or HTML via the plan_name parameter to packagehistory/listusagesdata.
|
[] | null | null | null | null | null |
|
RHSA-2019:1734
|
Red Hat Security Advisory: openstack-ironic-inspector security update
|
openstack-ironic-inspector: SQL Injection vulnerability when receiving introspection data
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 8.3 | null | null |
GHSA-244f-56x7-fc34
|
The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions."
|
[] | null | null | null | null | null |
|
GHSA-mj44-93c5-jc97
|
Microsoft Internet Explorer 8 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2024-23843
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Genians Genian NAC V5.0, Genians Genian NAC LTS V5.0.This issue affects Genian NAC V5.0: from V5.0.0 through V5.0.60; Genian NAC LTS V5.0: from 5.0.0 LTS through 5.0.55 LTS(Revision 125558), from 5.0.0 LTS through 5.0.56 LTS(Revision 125560).
|
[] | null | 2.2 | null | null | null |
|
CVE-2022-3647
|
Redis Crash Report debug.c sigsegvHandler denial of service
|
** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.
|
[
"cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*"
] | null | 3.1 | 3.1 | 1.8 |
https://github.com/redis/redis/commit/0bf90d944313919eb8e63d3588bf63a367f020a3
|
CVE-2025-5632
|
code-projects/anirbandutta9 Content Management System/News-Buzz users.php sql injection
|
A vulnerability was found in code-projects/anirbandutta9 Content Management System and News-Buzz 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/users.php. The manipulation of the argument change_to_admin leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
ICSA-14-105-01
|
Progea Movicon SCADA Information Disclosure Vulnerability
|
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.
|
[] | null | null | null | null | null |
CVE-2022-30489
|
WAVLINK WN535 G3 was discovered to contain a cross-site scripting (XSS) vulnerability via the hostname parameter at /cgi-bin/login.cgi.
|
[
"cpe:2.3:o:wavlink:wn535g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn535g3:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2023-46094
|
WordPress Conversios.io Plugin <= 6.5.3 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Conversios Track Google Analytics 4, Facebook Pixel & Conversions API via Google Tag Manager for WooCommerce plugin <= 6.5.3 versions.
|
[
"cpe:2.3:a:conversios:google_analytics_integration_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
GHSA-gh8x-r7fj-92h5
|
Mitsubishi Electric FR Configurator2, Version 1.16S and prior. This vulnerability can be triggered when an attacker provides the target with a rogue project file (.frc2). Once a user opens the rogue project, CPU exhaustion occurs, which causes the software to quit responding until the application is restarted.
|
[] | null | null | null | null | null |
|
GHSA-4732-gxvm-37j5
|
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152647626
|
[] | null | null | null | null | null |
|
GHSA-vjvg-7x3j-r63c
|
The Freedom First freedom-1st-credit-union-mobile-banking/id1085229458 app 3.0.0 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | 5.9 | null | null |
|
CVE-2023-40764
|
User enumeration is found in PHP Jabbers Car Rental Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
|
[
"cpe:2.3:a:phpjabbers:car_rental_script:3.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2012:1052
|
Red Hat Security Advisory: mod_cluster security update
|
mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null | null |
CVE-2019-6979
|
An issue was discovered in the User IP History Logs (aka IP_History_Logs) plugin 1.0.2 for MyBB. There is XSS via the admin/modules/tools/ip_history_logs.php useragent field.
|
[
"cpe:2.3:a:ip_history_logs_project:ip_history_logs:1.0.2:*:*:*:*:mybb:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2022-21852
|
Windows DWM Core Library Elevation of Privilege Vulnerability
|
Windows DWM Core Library Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
RHSA-2024:11148
|
Red Hat Security Advisory: gstreamer1-plugins-good security update
|
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.5 | null | null | null |
CVE-2023-4150
|
User Activity Tracking and Log < 4.0.9 - License Update/Deactivation via CSRF
|
The User Activity Tracking and Log WordPress plugin before 4.0.9 does not have proper CSRF checks when managing its license, which could allow attackers to make logged in admins update and deactivate the plugin's license via CSRF attacks
|
[
"cpe:2.3:a:mooveagency:user_activity_tracking_and_log:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2022-4830
|
Paid Memberships Pro < 2.9.9 - Contributor+ Stored XSS via Shortcode
|
The Paid Memberships Pro WordPress plugin before 2.9.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[
"cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2017-15263
|
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlListWalk+0x00000000000166c4."
|
[
"cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*"
] | null | null | 7.8 | 6.8 | null |
|
RHSA-2024:1904
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2024-45458
|
WordPress Spiffy Calendar plugin <= 4.9.13 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Reflected XSS.This issue affects Spiffy Calendar: from n/a through 4.9.13.
|
[
"cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
GHSA-h73g-3m4r-j2cr
|
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
|
[] | null | null | 7 | null | null |
|
GHSA-3gcp-ghxf-55qh
|
A denial of service vulnerability was reported in the firmware prior to version 1.01 used in Lenovo Printer LJ4010DN that could be triggered by a remote user sending a crafted packet to the device, preventing subsequent print jobs until the printer is rebooted.
|
[] | null | null | null | null | null |
|
CVE-2021-47152
|
mptcp: fix data stream corruption
|
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix data stream corruption
Maxim reported several issues when forcing a TCP transparent proxy
to use the MPTCP protocol for the inbound connections. He also
provided a clean reproducer.
The problem boils down to 'mptcp_frag_can_collapse_to()' assuming
that only MPTCP will use the given page_frag.
If others - e.g. the plain TCP protocol - allocate page fragments,
we can end-up re-using already allocated memory for mptcp_data_frag.
Fix the issue ensuring that the to-be-expanded data fragment is
located at the current page frag end.
v1 -> v2:
- added missing fixes tag (Mat)
|
[] | null | 5.5 | null | null | null |
CVE-2021-37620
|
Out-of-bounds read in XmpTextValue::read()
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
|
[
"cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.