id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-wpwm-r528-7p8j
|
In the Linux kernel, the following vulnerability has been resolved:scsi: lpfc: Fix SCSI I/O completion and abort handler deadlockDuring stress I/O tests with 500+ vports, hard LOCKUP call traces are
observed.CPU A:
native_queued_spin_lock_slowpath+0x192
_raw_spin_lock_irqsave+0x32
lpfc_handle_fcp_err+0x4c6
lpfc_fcp_io_cmd_wqe_cmpl+0x964
lpfc_sli4_fp_handle_cqe+0x266
__lpfc_sli4_process_cq+0x105
__lpfc_sli4_hba_process_cq+0x3c
lpfc_cq_poll_hdler+0x16
irq_poll_softirq+0x76
__softirqentry_text_start+0xe4
irq_exit+0xf7
do_IRQ+0x7fCPU B:
native_queued_spin_lock_slowpath+0x5b
_raw_spin_lock+0x1c
lpfc_abort_handler+0x13e
scmd_eh_abort_handler+0x85
process_one_work+0x1a7
worker_thread+0x30
kthread+0x112
ret_from_fork+0x1fDiagram of lockup:CPUA CPUBlpfc_cmd->buf_lock
phba->hbalock
lpfc_cmd->buf_lock
phba->hbalockFix by reordering the taking of the lpfc_cmd->buf_lock and phba->hbalock in
lpfc_abort_handler routine so that it tries to take the lpfc_cmd->buf_lock
first before phba->hbalock.
|
[] | null | 5.5 | null | null |
|
GHSA-cgc7-cg9h-8c4m
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in MagePeople Team Booking and Rental Manager for Bike plugin <= 1.2.1 versions.
|
[] | null | 5.9 | null | null |
|
CVE-2020-27001
|
A vulnerability has been identified in JT2Go (All versions < V13.1.0.2), Teamcenter Visualization (All versions < V13.1.0.2). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12041)
|
[
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2018-20005
|
An issue has been found in Mini-XML (aka mxml) 2.12. It is a use-after-free in mxmlWalkNext in mxml-search.c, as demonstrated by mxmldoc.
|
[
"cpe:2.3:a:msweet:mini-xml:2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2012-0842
|
surf: cookie jar has read access from other local user
|
[
"cpe:2.3:a:suckless:surf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-fg32-7hw7-w82p
|
Precor touchscreen console P62, P80, and P82 contains a default SSH public key in the authorized_keys file. A remote attacker could use this key to gain root privileges.
|
[] | null | 8.8 | null | null |
|
CVE-2021-20176
|
A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through a division by zero. The highest threat from this vulnerability is to system availability.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2021-28363
|
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.
|
[
"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 |
|
CVE-2021-30779
|
This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing a maliciously crafted image may lead to arbitrary code execution.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2020-10918
|
This vulnerability allows remote attackers to bypass authentication on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authentication mechanism. The issue is due to insufficient authentication on post-authentication requests. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from unauthenticated users. Was ZDI-CAN-10182.
|
[
"cpe:2.3:o:automationdirect:c-more_hmi_ea9_firmware:6.52:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-pgmsw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-rhmi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t10cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t10wcl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t12cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t15cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t15cl-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t6cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t6cl-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t7cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t7cl-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:ea9-t8cl:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-xrx4-5pqh-8mr5
|
IrfanView 4.44 (32bit) with FPX Plugin 4.47 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to a "Read Access Violation starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
|
[] | null | null | 7.8 | null |
|
CVE-2022-28732
|
Apache JSPWiki Cross-site scripting vulnerability on WeblogPlugin
|
A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.
|
[
"cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2021-23394
|
Remote Code Execution (RCE)
|
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
|
[
"cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-5gwj-42jg-vg3v
|
LinkedIn Browser Toolbar 3.0.3.1100 and earlier does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
|
[] | null | null | null | null |
|
GHSA-rvpg-jj9h-7jcw
|
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.
|
[] | null | 3.3 | null | null |
|
CVE-2014-0253
|
Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability."
|
[
"cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.5.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-28189
|
Judge0 vulnerable to Sandbox Escape Patch Bypass via chown running on Symbolic Link
|
Judge0 is an open-source online code execution system. The application uses the UNIX chown command on an untrusted file within the sandbox. An attacker can abuse this by creating a symbolic link (symlink) to a file outside the sandbox, allowing the attacker to run chown on arbitrary files outside of the sandbox. This vulnerability is not impactful on it's own, but it can be used to bypass the patch for CVE-2024-28185 and obtain a complete sandbox escape. This vulnerability is fixed in 1.13.1.
|
[
"cpe:2.3:a:judge0:judge0:*:*:*:*:*:*:*:*"
] | null | 10 | null | null |
RHSA-2025:1403
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.17 bug fix and security update
|
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.3 | null | null |
CVE-2016-2160
|
Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
|
[
"cpe:2.3:a:redhat:openshift_origin:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2018-19758
|
There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service.
|
[
"cpe:2.3:a:libsndfile_project:libsndfile:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-36fh-2j8m-mpcw
|
Buffer overflow in MyWebServer 1.02 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
[] | null | null | null | null |
|
CVE-2012-1837
|
The (1) webreports, (2) post/create-role, and (3) post/update-role programs in IBM Tivoli Endpoint Manager (TEM) before 8.2 do not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
|
[
"cpe:2.3:a:ibm:tivoli_endpoint_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_endpoint_manager:8.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-qx2w-wx28-8mhv
|
Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource.
|
[] | null | 4.9 | null | null |
|
GHSA-v96f-fh38-8r85
|
The FlashUpload component in Korean GHBoard uses a client-side protection mechanism to prevent uploading of dangerous file extensions, which allows remote attackers to bypass restrictions and upload arbitrary files via a modified copy of component/flashupload/upload.html.
|
[] | null | null | null | null |
|
CVE-2001-1235
|
pSlash PHP script 0.7 and earlier allows remote attackers to execute arbitrary code by including files from remote web sites, using an HTTP request that modifies the includedir variable.
|
[
"cpe:2.3:a:derek_leung:pslash:0.70:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2g2v-h26j-4qfh
|
A missing authentication for critical function vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote attackers to gain access to and execute certain functions.We have already fixed the vulnerability in the following version:
Notes Station 3 3.9.7 and later
|
[] | 9.3 | null | null | null |
|
GHSA-gv97-chp3-8xhh
|
The REST API component of TIBCO Software Inc.'s TIBCO PartnerExpress contains a vulnerability that theoretically allows an unauthenticated attacker with network access to obtain an authenticated login URL for the affected system via a REST API. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: version 6.2.0.
|
[] | null | null | null | null |
|
PYSEC-2021-47
| null |
Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
|
[] | null | null | null | null |
GHSA-r69r-v2gj-37jh
|
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow an authenticated user to bypass security. A user with access to a snapshot could apply unauthorized additional statuses via direct rest calls. IBM X-Force ID: 181856.
|
[] | null | 6.5 | null | null |
|
GHSA-w35w-5rg7-v2c5
|
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated RH file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
|
[] | null | null | null | null |
|
GHSA-r7v6-m227-rm4x
|
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands
|
[] | null | 6.7 | null | null |
|
CVE-2024-33989
|
Cross-Site Scripting (XSS) vulnerability in Janobe School Event Management System
|
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the 'eventdate' and 'events' parameters in 'port/event_print.php'.
|
[
"cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
GHSA-x73p-g67h-gmc8
|
The installer in XAMPP through 8.1.12 allows local users to write to the C:\xampp directory. Common use cases execute files under C:\xampp with administrative privileges.
|
[] | null | 6.7 | null | null |
|
GHSA-5gvr-285q-pwc3
|
A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.
|
[] | null | 6.5 | null | null |
|
cisco-sa-20191002-ucm-secbypass
|
Cisco Unified Communications Manager Security Bypass Vulnerability
|
A vulnerability in the web-based interface of Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to bypass security restrictions.
The vulnerability is due to improper handling of malformed HTTP methods. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to gain unauthorized access to the system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ucm-secbypass ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ucm-secbypass"]
|
[] | null | null | 6.5 | null |
CVE-2015-7634
|
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633.
|
[
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2009:1101
|
Red Hat Security Advisory: cscope security update
|
cscope: multiple buffer overflows cscope: multiple buffer overflows cscope: multiple buffer overflows cscope: putstring buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2003-1216
|
SQL injection vulnerability in search.php for phpBB 2.0.6 and earlier allows remote attackers to execute arbitrary SQL and gain privileges via the search_id parameter.
|
[
"cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-4973
|
i2myspell in myspell 3.1 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/i2my#####.1 and (2) /tmp/i2my#####.2 temporary files.
|
[
"cpe:2.3:a:debian:myspell:3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-j545-cjf3-8m8v
|
When using certain blank characters in a URL, they where incorrectly rendered as spaces instead of an encoded URL. This vulnerability affects Firefox < 77.
|
[] | null | null | null | null |
|
GHSA-xjhv-m7vj-8xjp
|
Directory traversal vulnerability in a certain ActiveX control in Nessus Vulnerability Scanner 3.0.6 allows remote attackers to delete arbitrary files via a .. (dot dot) in the argument to the deleteReport method, probably related to the SCANCTRL.ScanCtrlCtrl.1 ActiveX control in scan.dll.
|
[] | null | null | null | null |
|
RHSA-2021:4788
|
Red Hat Security Advisory: krb5 security update
|
krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
CVE-2012-0245
|
Multiple stack-based buffer overflows in RobNetScanHost.exe in ABB Robot Communications Runtime before 5.14.02, as used in ABB Interlink Module, IRC5 OPC Server, PC SDK, PickMaster 3 and 5, RobView 5, RobotStudio, WebWare SDK, and WebWare Server, allow remote attackers to execute arbitrary code via a crafted (1) 0xA or (2) 0xE Netscan packet.
|
[
"cpe:2.3:a:abb:interlink_module:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:irc5_opc_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:pc_sdk:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:pickmaster_3:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:pickmaster_5:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:robot_communications_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:robotstudio:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:robview_5:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:webware_sdk:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:webware_server:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-whrr-78qv-jjpm
|
Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null |
|
CVE-2021-1831
|
The issue was addressed with improved permissions logic. This issue is fixed in iOS 14.5 and iPadOS 14.5. An application may allow shortcuts to access restricted files.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-mmjf-f88c-6h59
|
Directory traversal vulnerability in HP System Management Homepage (SMH) 2.0.0 through 2.1.4 on Windows allows remote attackers to access certain files via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2025-32648
|
WordPress Projectopia - Project Magement Plugin <= 5.1.16 - Privilege Escalation vulnerability
|
Incorrect Privilege Assignment vulnerability in Projectopia Projectopia allows Privilege Escalation. This issue affects Projectopia: from n/a through 5.1.16.
|
[] | null | 9.8 | null | null |
CVE-2024-1462
|
The Maintenance Page plugin for WordPress is vulnerable to Basic Information Exposure in all versions up to, and including, 1.0.8 via the REST API. This makes it possible for unauthenticated attackers to view post titles and content when the site is in maintenance mode.
|
[
"cpe:2.3:a:themegrill:maintenance_page:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2021-31552
|
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly executed certain rules related to blocking accounts after account creation. Such rules would allow for user accounts to be created while blocking only the IP address used to create an account (and not the user account itself). Such rules could also be used by a nefarious, unprivileged user to catalog and enumerate any number of IP addresses related to these account creations.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 5.5 |
|
GHSA-gvw4-x4h8-82qr
|
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (All versions >= V8.80), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (All versions >= V8.80), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions >= V9.50 < V9.90). Affected devices do not properly validate SNMP GET requests. This could allow an unauthenticated, remote attacker to retrieve sensitive information of the affected devices with SNMPv2 GET requests using default credentials.
|
[] | 8.7 | 7.5 | null | null |
|
CVE-2015-5081
|
Cross-site request forgery (CSRF) vulnerability in django CMS before 3.0.14, 3.1.x before 3.1.1 allows remote attackers to manipulate privileged users into performing unknown actions via unspecified vectors.
|
[
"cpe:2.3:a:django-cms:django_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:django-cms:django_cms:3.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2022-42419
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. Crafted data in a TIF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18700.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-4vh8-mwxv-vg98
|
The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 7.2 | null | null |
|
CVE-2024-9746
|
Tungsten Automation Power PDF TGA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Tungsten Automation Power PDF TGA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of TGA files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24462.
|
[
"cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2021-36753
|
sharkdp BAT before 0.18.2 executes less.exe from the current working directory.
|
[
"cpe:2.3:a:bat_project:bat:*:*:*:*:*:rust:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2008-4261
|
Stack-based buffer overflow in Microsoft Internet Explorer 5.01 SP4, 6 SP1 on Windows 2000, and 6 on Windows XP and Server 2003 does not properly handle extraneous data associated with an object embedded in a web page, which allows remote attackers to execute arbitrary code via crafted HTML tags that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-667q-vj58-rj88
|
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
|
A exposure of sensitive information vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in Computer.java that allows attackers With Overall/Read permission to access the connection log for any agent.
|
[] | null | null | 4.3 | null |
CVE-2007-2005
|
Multiple PHP remote file inclusion vulnerabilities in the Taskhopper 1.1 component for Mambo and Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) contact_type.php, (2) itemstatus_type.php, (3) projectstatus_type.php, (4) request_type.php, (5) responses_type.php, (6) timelog_type.php, or (7) urgency_type.php in inc/.
|
[
"cpe:2.3:a:joomla:taskhopper_component:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:taskhopper_component:1.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2019-7977
|
Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have an out of bound read vulnerability. Successful exploitation could lead to memory leak.
|
[
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-mvcp-j3fp-64mm
|
Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.
|
[] | null | 9.8 | null | null |
|
GHSA-768c-fmgx-4fwr
|
Multiple stored XSS in Vanilla Forums before 2.5 allow remote attackers to inject arbitrary JavaScript code into any message on forum.
|
[] | null | null | 5.4 | null |
|
GHSA-mwjq-q4w6-76fx
|
A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been declared as critical. This vulnerability affects the function setMtknatCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mtkhnatEnable leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | null | null |
|
RHSA-2013:1220
|
Red Hat Security Advisory: xml-security security update
|
Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2017:2258
|
Red Hat Security Advisory: gtk-vnc security, bug fix, and enhancement update
|
gtk-vnc: Improper check of framebuffer boundaries when processing a tile gtk-vnc: Integer overflow when processing SetColorMapEntries
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.1 | null |
CVE-2025-41672
|
WAGO: Vulnerability in WAGO Device Sphere
|
A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices.
|
[] | null | 10 | null | null |
CVE-2012-1569
|
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
|
[
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:0.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:2.10:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-v345-c5xh-xx6f
|
Procom NetFORCE 800 4.02 M10 Build 20 and possibly other versions sends the NIS password map (passwd.nis) as a file attachment in diagnostic e-mail messages, which allows remote attackers to obtain the cleartext NIS password hashes.
|
[] | null | 7.5 | null | null |
|
GHSA-c3pg-x39q-9m4c
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WhiteStudio Easy Form Builder.This issue affects Easy Form Builder: from n/a through 3.7.4.
|
[] | null | 8.5 | null | null |
|
GHSA-j2c7-crjq-25xv
|
The OneFile Ignite (aka uk.co.onefile.ignite) application 1.19 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null |
|
GHSA-rf72-xhmw-2xvx
|
Mozilla developers reported memory safety bugs present in Firefox 70. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 71.
|
[] | null | null | null | null |
|
GHSA-67qx-v8w9-q5x5
|
An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka "Windows Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.
|
[] | null | null | 7.8 | null |
|
CVE-2019-14913
|
An issue was discovered in PRiSE adAS 1.7.0. Log data are not properly escaped, leading to persistent XSS in the administration panel.
|
[
"cpe:2.3:a:prise:adas:1.7.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2004-1519
|
SQL injection vulnerability in bug.php in phpBugTracker 0.9.1 allows remote attackers to execute arbitrary SQL commands via (1) the bug_id parameter in a viewvotes operation or (2) the project parameter in an add operation.
|
[
"cpe:2.3:a:benjamin_curtis:phpbugtracker:0.9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2015-7219
|
The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a malformed PushPromise frame that triggers decompressed-buffer length miscalculation and incorrect memory allocation.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-45352
|
Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system via a Common Management Portal web interface Path traversal vulnerability allowing write access outside the intended folders. This is also known as OCMP-6592.
|
[
"cpe:2.3:a:atos:unify_openscape_common_management:10:-:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-68gv-9r74-xmm7
|
A Unix account with a name other than "root" has UID 0, i.e. root privileges.
|
[] | null | null | null | null |
|
GHSA-9x9p-9538-ffc5
|
The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.
|
[] | null | 8.8 | null | null |
|
CVE-2021-3821
|
A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Denial of Service when running HP Workpath solutions on potentially affected products.
|
[
"cpe:2.3:o:hp:futuresmart_5:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-20955
|
Vulnerability in the Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:graalvm:20.3.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:22.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
|
CVE-2020-27612
|
Greenlight in BigBlueButton through 2.2.28 places usernames in room URLs, which may represent an unintended information leak to users in a room, or an information leak to outsiders if any user publishes a screenshot of a browser window.
|
[
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2022-45470
|
Apache Hama allows XSS and information disclosure
|
missing input validation in Apache Hama may cause information disclosure through path traversal and XSS. Since Apache Hama is EOL, we do not expect these issues to be fixed.
|
[
"cpe:2.3:a:apache:hama:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2025-31541
|
WordPress TuriTop Booking System plugin <= 1.0.10 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in turitop TuriTop Booking System allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects TuriTop Booking System: from n/a through 1.0.10.
|
[] | null | 6.5 | null | null |
GHSA-r7wr-4w5q-55m6
|
Cilium vulnerable to information leakage via incorrect ReferenceGrant handling
|
ImpactWhen the [Gateway API](https://docs.cilium.io/en/v1.13/network/servicemesh/gateway-api/gateway-api/) is enabled in Cilium, the absence of a check on the namespace in which a [ReferenceGrant](https://gateway-api.sigs.k8s.io/api-types/referencegrant/) is created could result in Cilium gaining visibility of secrets (including certificates) and services across namespaces.An attacker on an affected cluster can configure Cilium to use cluster secrets or communicate with services that it should not have access to.Gateway API functionality is disabled by default.PatchesThis vulnerability is fixed in Cilium release 1.13.4.Cilium versions <1.13 are not affected.WorkaroundsThere is no workaround to this issue.AcknowledgementsThe Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @meyskens for investigating and fixing the issue.For more informationIf you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [security@cilium.io](mailto:security@cilium.io) - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[] | null | 3.4 | null | null |
CVE-2021-3110
|
The store system in PrestaShop 1.7.7.0 allows time-based boolean SQL injection via the module=productcomments controller=CommentGrade id_products[] parameter.
|
[
"cpe:2.3:a:prestashop:prestashop:1.7.7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-31903
|
IBM Sterling B2B Integrator Standard Edition code execution
|
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 allow an attacker on the local network to execute arbitrary code on the system, caused by the deserialization of untrusted data.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.5:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.2:*:*:*:standard:*:*:*"
] | null | 8.8 | null | null |
CVE-2025-0497
|
Rockwell Automation FactoryTalk® AssetCentre Data Exposure Vulnerability
|
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.
|
[] | 7.3 | null | null | null |
GHSA-vqm9-87vr-9765
|
A group deletion race condition in 2FAuth v5.5.0 causes data inconsistencies and orphaned accounts when a group is deleted while other operations are pending.
|
[] | null | 6.5 | null | null |
|
GHSA-vw47-w94h-267c
|
Local file inclusion in WebCalendar before 1.2.5.
|
[] | null | null | null | null |
|
GHSA-f6jc-q8w3-xvwj
|
The PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10, with Saved Templates Addon enabled, allows users with Contributor roles or higher to read password-protected or private post contents the user is otherwise unable to read, given the post ID.
|
[] | null | 4.3 | null | null |
|
CVE-2015-0077
|
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly initialize function buffers, which allows local users to obtain sensitive information from kernel memory, and possibly bypass the ASLR protection mechanism, via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2023-40024
|
Reflected Cross-Site Scripting (XSS) in scancode.io license endpoint
|
ScanCode.io is a server to script and automate software composition analysis pipelines. In the `/license/` endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist. Attackers can exploit this vulnerability to inject malicious scripts into the response generated by the `license_details_view` function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information. This issue has been addressed in release `32.5.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:nexb:scancode.io:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-32g7-xrvv-4v99
|
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, compromised WLAN FW can potentially cause a buffer overwrite.
|
[] | null | null | 7.3 | null |
|
CVE-2023-2578
|
Buy Me a Coffee < 3.7 - Admin+ Stored XSS
|
The Buy Me a Coffee WordPress plugin before 3.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:buymeacoffee:buy_me_a_coffee:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2021-35106
|
Possible out of bound read due to improper length calculation of WMI message. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
|
[
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2004-2344
|
Unknown vulnerability in the ASN.1/H.323/H.225 stack of VocalTec VGW120 and VGW480 allows remote attackers to cause a denial of service.
|
[
"cpe:2.3:h:vocaltec:vgw120_telephony_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vocaltec:vgw480_telephony_gateway:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-23539
|
An issue was discovered in Realtek rtl8723de BLE Stack <= 4.1 that allows remote attackers to cause a Denial of Service via the interval field to the CONNECT_REQ message.
|
[
"cpe:2.3:o:realtek:rtl8723de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtl8723de:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-vr25-3f4m-xw8f
|
SQL injection vulnerability in index.php in the Simpleboard (com_simpleboard) 1.0.3 Stable component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a view action.
|
[] | null | null | null | null |
|
GHSA-599q-543m-6qfh
|
PHP remote file inclusion vulnerability in about.mgm.php in Mambo Gallery Manager (MGM) 0.95r2 and earlier for Mambo 4.5 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
[] | null | null | null | null |
|
GHSA-g4hj-ppgf-vg4f
|
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart.
|
[] | null | 7.5 | null | null |
|
CVE-2017-15774
|
XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls Code Flow starting at CADImage+0x0000000000221a9a."
|
[
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.