id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-2834-vx6f-v89w
Multiple unspecified vulnerabilities in bundled stored procedures in the Spatial Extender component in IBM DB2 9.5 before FP5 have unknown impact and remote attack vectors, related to "remote exploits."
[]
CVE-2006-5787
admin/index.php in IPrimal Forums as of 20061105 allows remote attackers to bypass authentication and modify user passwords via a direct request, possibly related to an authentication issue in admin/chk_admin.php.
[ "cpe:2.3:a:iprimal:iprimal_forums:*:*:*:*:*:*:*:*" ]
CVE-2023-24897
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio:2015:update5:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ]
GHSA-8g3x-8p3x-3f3c
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.
[]
CVE-2025-30144
Fast-JWT Improperly Validates iss Claims
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT will be deemed valid. Furthermore, if the application relies on external libraries like get-jwks that do not independently validate the iss claim, the attacker can leverage this vulnerability to forge a JWT that will be accepted by the victim application. Essentially, the attacker can insert their own domain into the iss array, alongside the legitimate issuer, and bypass the intended security checks. This issue is fixed in 5.0.6.
[]
CVE-2024-44818
Cross Site Scripting vulnerability in ZZCMS v.2023 and before allows a remote attacker to obtain sensitive information via the HTTP_Referer header of the caina.php component.
[ "cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*" ]
CVE-2019-20030
An attacker with knowledge of the modem access number on a NEC UM8000 voicemail system may use SSH tunneling or standard Linux utilities to gain access to the system's LAN port. All versions are affected.
[ "cpe:2.3:o:nec:um8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:um8000:-:*:*:*:*:*:*:*" ]
CVE-2025-6406
Campcodes Online Hospital Management System forgot-password.php sql injection
A vulnerability, which was classified as critical, has been found in Campcodes Online Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /hms/forgot-password.php. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-3vqc-jwrr-3r9x
Heap-based buffer overflow in the KWord RTF importer for KOffice 1.2.0 through 1.4.1 allows remote attackers to execute arbitrary code via a crafted RTF file.
[]
GHSA-8jwc-8ww6-25xw
An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.
[]
GHSA-gmqc-q447-328q
Windows Control Flow Guard in Microsoft Windows 10 Version 1703 allows an attacker to run a specially crafted application to bypass Control Flow Guard, due to the way that Control Flow Guard handles objects in memory, aka "Windows Security Feature Bypass Vulnerability".
[]
GHSA-7624-6867-rjhv
The (1) psp (aka .tub), (2) bmp, (3) pcx, and (4) psd plugins in gimp allow user-assisted remote attackers to cause a denial of service (crash or memory consumption) via crafted image files, as discovered using the fusil fuzzing tool.
[]
GHSA-rr2x-68r9-76qv
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1077, CVE-2020-1086, CVE-2020-1090, CVE-2020-1125, CVE-2020-1139, CVE-2020-1149, CVE-2020-1151, CVE-2020-1155, CVE-2020-1157, CVE-2020-1158, CVE-2020-1164.
[]
CVE-2024-28250
Cilium has possible unencrypted traffic between nodes when using WireGuard and L7 policies
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.8 and 1.15.2, In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies Wireguard-eligible traffic that is sent between a node's Envoy proxy and pods on other nodes is sent unencrypted and Wireguard-eligible traffic that is sent between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.14.8 and 1.15.2 in in native routing mode (`routingMode=native`) and in Cilium 1.14.4 in tunneling mode (`routingMode=tunnel`). Not that in tunneling mode, `encryption.wireguard.encapsulate` must be set to `true`. There is no known workaround for this issue.
[ "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" ]
GHSA-7q22-vf3p-qvwp
Foresight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property.
[]
GHSA-vwxx-w68r-9cm2
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: CPA v1 V-2023-009.
[]
CVE-2014-9453
Multiple cross-site scripting (XSS) vulnerabilities in simple-visitor-stat.php in the Simple visitor stat plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP User-Agent or (2) HTTP Referer header.
[ "cpe:2.3:a:simple_visitor_stat_project:simple_visitor_stat:-:*:*:*:*:wordpress:*:*" ]
GHSA-27hg-xg89-rq4f
A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All versions < V16 Update 7), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 7), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2), SIMATIC STEP 7 V16 (All versions < V16 Update 7), SIMATIC STEP 7 V17 (All versions < V17 Update 7), SIMATIC STEP 7 V18 (All versions < V18 Update 2), SIMATIC WinCC Unified V16 (All versions < V16 Update 7), SIMATIC WinCC Unified V17 (All versions < V17 Update 7), SIMATIC WinCC Unified V18 (All versions < V18 Update 2), SIMATIC WinCC V16 (All versions < V16.7), SIMATIC WinCC V17 (All versions < V17.7), SIMATIC WinCC V18 (All versions < V18 Update 2), SIMOCODE ES V16 (All versions < V16 Update 7), SIMOCODE ES V17 (All versions < V17 Update 7), SIMOCODE ES V18 (All versions < V18 Update 2), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 7), SIRIUS Safety ES V18 (All versions < V18 Update 2), SIRIUS Soft Starter ES V17 (All versions < V17 Update 7), SIRIUS Soft Starter ES V18 (All versions < V18 Update 2), Soft Starter ES V16 (All versions < V16 Update 7), TIA Portal Cloud V3.0 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing hardware configuration profiles. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
[]
GHSA-jc7g-72g3-7wj8
The ultimate-member plugin before 2.0.54 for WordPress has XSS.
[]
CVE-2024-22023
An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS.
[ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:lts:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.2:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.3:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.4:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.5:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.6:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r17:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r18:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.2:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.3:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.4:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.5:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.6:*:*:*:*:*:*:*" ]
CVE-2015-2194
Unrestricted file upload vulnerability in the fusion_options function in functions.php in the Fusion theme 3.1 for Wordpress allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension in a fusion_save action, then accessing it via unspecified vectors.
[ "cpe:2.3:a:digitalnature:fusion:3.1:*:*:*:*:wordpress:*:*" ]
CVE-2024-55605
Suricata allows stack overflow in transforms
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8.
[]
CVE-2022-31697
The vCenter Server contains an information disclosure vulnerability due to the logging of credentials in plaintext. A malicious actor with access to a workstation that invoked a vCenter Server Appliance ISO operation (Install/Upgrade/Migrate/Restore) can access plaintext passwords used during that operation.
[ "cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3r:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3s:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update3t:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3n:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3o:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3p:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3q:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update3r:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ]
CVE-2013-5388
Cross-site scripting (XSS) vulnerability in iNotes in IBM Domino 8.5.3 before FP5 IF2 and 9.0 before IF5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka SPR PTHN9AYK5F.
[ "cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:9.0.0.0:*:*:*:*:*:*:*" ]
CVE-2023-30536
Insecure header validation in slim/psr7
slim/psr7 is a PSR-7 implementation for use with Slim 4. In versions prior to 1.6.1 an attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. An attacker that is able to control the header names that are passed to Slilm-Psr7 would be able to intentionally craft invalid messages, possibly causing application errors or invalid HTTP requests being sent out with an PSR-18 HTTP client. The latter might present a denial of service vector if a remote service’s web application firewall bans the application due to the receipt of malformed requests. The issue has been patched in version 1.6.1. There are no known workarounds to this issue. Users are advised to upgrade.
[ "cpe:2.3:a:slimframework:slim_psr-7:*:*:*:*:*:*:*:*" ]
GHSA-cj36-rwcw-fx5g
Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.4.
[]
CVE-2021-38981
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788.
[ "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-5xcc-vqv2-73j8
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
[]
CVE-2017-7358
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
[ "cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*" ]
GHSA-8c5g-69wp-x3wv
Deserialization vulnerability in the IPC module Impact: Successful exploitation of this vulnerability may affect availability.
[]
CVE-2023-39049
An information leak in youmart-tokunaga v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
[ "cpe:2.3:a:youmart-tokunaga_project:youmart-tokunaga:13.6.1:*:*:*:*:*:*:*" ]
GHSA-vf73-73px-qwhg
Possibility of out of bound access in debug queue, if packet size field is corrupted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCN7605, QCS405, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[]
CVE-2014-3985
The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
[ "cpe:2.3:a:miniupnp_project:miniupnp:1.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
CVE-2008-0501
Directory traversal vulnerability in phpMyClub 0.0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page_courante parameter to the top-level URI.
[ "cpe:2.3:a:sourceforge:phpmyclub:0.0.1:*:*:*:*:*:*:*" ]
GHSA-f632-c3rh-r2v2
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
[]
GHSA-3rcc-2gfp-q4g4
PHP Scripts Mall PHP Multivendor Ecommerce has XSS via the category.php chid1 parameter.
[]
CVE-2022-4340
BookingPress < 1.0.31 - Unauthenticated IDOR in appointment_id
The BookingPress WordPress plugin before 1.0.31 suffers from an Insecure Direct Object Reference (IDOR) vulnerability in it's thank you page, allowing any visitor to display information about any booking, including full name, date, time and service booked, by manipulating the appointment_id query parameter.
[ "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*" ]
GHSA-9838-c2wv-jc32
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in avalex GmbH avalex – Automatically secure legal texts plugin <= 3.0.3 versions.
[]
CVE-2024-50168
net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
In the Linux kernel, the following vulnerability has been resolved: net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() The sun3_82586_send_packet() returns NETDEV_TX_OK without freeing skb in case of skb->len being too long, add dev_kfree_skb() to fix it.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ]
GHSA-fv6c-jjp9-hj5r
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on the 'titleTag' user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-27c3-mh68-3469
The hamgr service in the IPv6 Proxy Mobile (PM) implementation in Cisco StarOS 18.1.0.59776 on ASR 5000 devices allows remote attackers to cause a denial of service (service reload and call-processing outage) via malformed PM packets, aka Bug ID CSCut94711.
[]
GHSA-rpq2-3p69-p45w
Due to missing authentication check, SAP Business one License service API - version 10.0 allows an unauthenticated attacker to send malicious http requests over the network. On successful exploitation, an attacker can break the whole application making it inaccessible.
[]
CVE-2008-0831
Multiple SQL injection vulnerabilities in the Rapid Recipe (com_rapidrecipe) 1.6.5 and earlier component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) user_id or (2) category_id parameter. NOTE: this might overlap CVE-2008-0754.
[ "cpe:2.3:a:joomla:rapid_recipe:*:*:*:*:*:*:*:*" ]
GHSA-mm99-fj7x-hc5q
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
[]
GHSA-fv9w-2hpj-4q5w
A business logic issue in the handling of large repositories in all versions of GitLab CE/EE from 10.0 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allowed an authenticated and authorized user to exhaust server resources by importing a malicious project.
[]
CVE-2015-0058
Double free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a crafted application, aka "Windows Cursor Object Double Free Vulnerability."
[ "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*" ]
CVE-2012-4217
Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" ]
GHSA-p9xf-74xh-mhw5
1Panel command injection vulnerability in Firewall ip functionality
SummaryAn OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.Details1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands.PoCthe payload `; sleep 3 #` will lead server response in 3 seconds ![image](https://user-images.githubusercontent.com/4935500/252299676-bc4a8b92-e475-40ee-a92a-fec9fad7a6c3.png)the payload `; sleep 6 #` will lead server response in 6 seconds ![image](https://user-images.githubusercontent.com/4935500/252299871-766cc411-69e5-4c6c-b4ff-7774fa974ea0.png)ImpactAn attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system.PatchesThe vulnerability has been fixed in v1.4.3.WorkaroundsIt is recommended to upgrade the version to v1.4.3.ReferencesIf you have any questions or comments about this advisory:Open an issue in https://github.com/1Panel-dev/1Panel Email us at wanghe@fit2cloud.com
[]
GHSA-qjrp-xr9r-wmrg
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained.If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
[]
CVE-2024-13946
Binary Planting / LoadLibrary DLL's not Signed
DLL's are not digitally signed when loaded in ASPECT's configuration toolset exposing the application to binary planting during device commissioning.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.
[]
GHSA-75jm-2xrg-5wpf
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
[]
CVE-2010-1520
Cross-site scripting (XSS) vulnerability in logout.php in TaskFreak! Original multi user before 0.6.4 allows remote attackers to inject arbitrary web script or HTML via the tznMessage parameter.
[ "cpe:2.3:a:taskfreak:taskfreak\\!:*:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:taskfreak:taskfreak\\!:0.6.2:*:*:*:*:*:*:*" ]
CVE-2024-34255
jizhicms v2.5.1 contains a Cross-Site Scripting(XSS) vulnerability in the message function.
[ "cpe:2.3:a:cherry-toto:jizhicms:-:*:*:*:*:*:*:*" ]
CVE-2021-37102
There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0.
[ "cpe:2.3:a:huawei:fusioncompute:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:fusioncompute:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:fusioncompute:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:fusioncompute:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:fusioncompute:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:fusioncompute:8.0.0:*:*:*:*:*:*:*" ]
CVE-2018-8420
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka "MS XML Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*", "cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2012:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2012:r2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2016:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2016:1709:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2016:1803:*:*:*:*:*:*" ]
GHSA-jr49-v8x2-j3gh
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIFWhen we want to know whether we should look for the mac_id or the link_id in struct iwl_mvm_session_prot_notif, we should look at the version of SESSION_PROTECTION_NOTIF.This causes WARNINGs:WARNING: CPU: 0 PID: 11403 at drivers/net/wireless/intel/iwlwifi/mvm/time-event.c:959 iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] RIP: 0010:iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] Code: 00 49 c7 84 24 48 07 00 00 00 00 00 00 41 c6 84 24 78 07 00 00 ff 4c 89 f7 e8 e9 71 54 d9 e9 7d fd ff ff 0f 0b e9 23 fe ff ff <0f> 0b e9 1c fe ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffb4bb00003d40 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff9ae63a361000 RCX: ffff9ae4a98b60d4 RDX: ffff9ae4588499c0 RSI: 0000000000000305 RDI: ffff9ae4a98b6358 RBP: ffffb4bb00003d68 R08: 0000000000000003 R09: 0000000000000010 R10: ffffb4bb00003d00 R11: 000000000000000f R12: ffff9ae441399050 R13: ffff9ae4761329e8 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff9ae7af400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055fb75680018 CR3: 00000003dae32006 CR4: 0000000000f70ef0 PKRU: 55555554 Call Trace: <IRQ> ? show_regs+0x69/0x80 ? __warn+0x8d/0x150 ? iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] ? report_bug+0x196/0x1c0 ? handle_bug+0x45/0x80 ? exc_invalid_op+0x1c/0xb0 ? asm_exc_invalid_op+0x1f/0x30 ? iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] iwl_mvm_rx_common+0x115/0x340 [iwlmvm] iwl_mvm_rx_mq+0xa6/0x100 [iwlmvm] iwl_pcie_rx_handle+0x263/0xa10 [iwlwifi] iwl_pcie_napi_poll_msix+0x32/0xd0 [iwlwifi]
[]
CVE-2025-22231
VMware Aria Operations updates address a local privilege escalation vulnerability (CVE-2025-22231)
VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations.
[]
CVE-2014-4634
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
[ "cpe:2.3:a:emc:appsync:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.5.1:*:*:*:*:*:*:*" ]
CVE-2024-51513
Vulnerability of processes not being fully terminated in the VPN module Impact: Successful exploitation of this vulnerability will affect power consumption.
[ "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*" ]
CVE-2017-14725
Before version 4.8.2, WordPress was susceptible to an open redirect attack in wp-admin/edit-tag-form.php and wp-admin/user-edit.php.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
CVE-2006-1360
Multiple SQL injection vulnerabilities in MusicBox 2.3 Beta 2 allow remote attackers to execute arbitrary SQL commands via the (1) id, (2) type, or (3) show parameter to (a) index.php; or the (4) message1 or (5) message parameter to (b) cart.php.
[ "cpe:2.3:a:musicbox:musicbox:2.3_beta_2:*:*:*:*:*:*:*" ]
CVE-2011-1206
Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.65:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.66:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*" ]
GHSA-x642-x5w5-q86p
Cross-site scripting (XSS) vulnerability in tools_ftp_pwaendern.php in Confixx Pro 3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the account parameter.
[]
CVE-2017-7534
OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod.
[ "cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*" ]
GHSA-f425-pfvh-x64x
PHP remote file inclusion vulnerability in install/config.php in Picturesolution 2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path parameter.
[]
CVE-2021-45346
A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.
[ "cpe:2.3:a:sqlite:sqlite:3.35.1:*:*:*:*:*:*:*", "cpe:2.3:a:sqlite:sqlite:3.37.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" ]
CVE-2016-4984
/usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it.
[ "cpe:2.3:a:openldap:openldap-servers:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ]
GHSA-pqpx-gpvg-4m34
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
[]
GHSA-v236-hjfr-f8x2
The Denny's application before 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-hh5p-vgjc-p9vq
Cross-site scripting (XSS) vulnerability in LogiSphere 0.9.9j allows remote attackers to inject arbitrary Javascript via the msg command. NOTE: due to lack of appropriate details by the original researcher, it is unclear whether this issue is distinct from the msg DoS.
[]
CVE-2023-22505
This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22505 was introduced in version 8.0.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 8.3.2, 8.4.0. See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html).|https://confluence.atlassian.com/doc/confluence-release-notes-327.html).] You can download the latest version of Confluence Data Center & Server from the download center ([https://www.atlassian.com/software/confluence/download-archives).|https://www.atlassian.com/software/confluence/download-archives).] This vulnerability was discovered by a private user and reported via our Bug Bounty program.
[ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ]
CVE-2021-2119
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
CVE-2012-6524
SQL injection vulnerability in kommentar.php in pGB 2.12 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:powie:pgb:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:powie:pgb:2.14:*:*:*:*:*:*:*" ]
CVE-2021-47302
igc: Fix use-after-free error during reset
In the Linux kernel, the following vulnerability has been resolved: igc: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If igc_poll() runs while the controller is being reset this can lead to the driver try to free a skb that was already freed. Log message: [ 101.525242] refcount_t: underflow; use-after-free. [ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0 [ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E) ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E) rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E) soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E) iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E) soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E) i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E) [ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E) e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E) usbcore(E) drm(E) button(E) video(E) [ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe [ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017 [ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0 [ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48 44 01 01 e8 d1 c6 42 00 <0f> 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3 [ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286 [ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001 [ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff [ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50 [ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00 [ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40 [ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000 [ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0 [ 101.525343] Call Trace: [ 101.525346] sock_wfree+0x9c/0xa0 [ 101.525353] unix_destruct_scm+0x7b/0xa0 [ 101.525358] skb_release_head_state+0x40/0x90 [ 101.525362] skb_release_all+0xe/0x30 [ 101.525364] napi_consume_skb+0x57/0x160 [ 101.525367] igc_poll+0xb7/0xc80 [igc] [ 101.525376] ? sched_clock+0x5/0x10 [ 101.525381] ? sched_clock_cpu+0xe/0x100 [ 101.525385] net_rx_action+0x14c/0x410 [ 101.525388] __do_softirq+0xe9/0x2f4 [ 101.525391] __local_bh_enable_ip+0xe3/0x110 [ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0 [ 101.525398] irq_forced_thread_fn+0x6a/0x80 [ 101.525401] irq_thread+0xe8/0x180 [ 101.525403] ? wake_threads_waitq+0x30/0x30 [ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0 [ 101.525408] kthread+0x183/0x1a0 [ 101.525412] ? kthread_park+0x80/0x80 [ 101.525415] ret_from_fork+0x22/0x30
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*" ]
CVE-2002-1722
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
[ "cpe:2.3:h:logitech:cordless_freedom_itouch_keyboard:*:*:*:*:*:*:*:*", "cpe:2.3:h:logitech:cordless_itouch_keyboard:*:*:*:*:*:*:*:*", "cpe:2.3:h:logitech:itouch_keyboard:*:*:*:*:*:*:*:*" ]
CVE-2024-49120
Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
[]
GHSA-984r-fgr9-vwgq
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.54 and 8.55 allows remote attackers to affect confidentiality and integrity via vectors related to Integration Broker, a different vulnerability than CVE-2016-5529 and CVE-2016-5530.
[]
CVE-2013-5811
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, and 5.0 SP1a-b allows remote authenticated users to affect confidentiality via unknown vectors related to Web.
[ "cpe:2.3:a:oracle:industry_applications:4.5:sp3:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3a:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3b:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3c:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3d:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3e:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3f:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3g:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3h:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3i:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3j:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.5:sp3k:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp0:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp0a:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp0b:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp0c:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp1a:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp1b:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp1c:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp2:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp2a:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp2b:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:4.6:sp2c:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:5.0:sp0:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:5.0:sp0a:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:5.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:5.0:sp1a:*:*:*:*:*:*", "cpe:2.3:a:oracle:industry_applications:5.0:sp1b:*:*:*:*:*:*" ]
GHSA-75fp-j7f7-j7j8
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, and CD321 IP Cameraswith firmware version M2.1.6.05 are vulnerable to stack-based overflows. During the process of updating certain settings sent from incoming network requests, the product does not sufficiently check or validate allocated buffer size. This may lead to remote code execution.
[]
CVE-2008-0152
SLnet.exe in SeattleLab SLNet RF Telnet Server 4.1.1.3758 and earlier allows user-assisted remote attackers to cause a denial of service (crash) via unspecified telnet options, which triggers a NULL pointer dereference. NOTE: the crash is not user-assisted when the server is running in debug mode.
[ "cpe:2.3:o:seattle_lab_software:slnet_rf_telnet_server:*:*:*:*:*:*:*:*" ]
CVE-2025-23392
Reflected XSS in SystemsController.java in spacewalk-java
A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in spacewalk-java allows execution of arbitrary Javascript code on target systems.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3.
[]
CVE-2021-20870
Improper handling of exceptional conditions vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, bizhub 4752/4052 GC9-X4 and earlier, bizhub C3850/C3350/3850FS, bizhub 4750/4050, bizhub C3110, bizhub C3100P) allows a physical attacker to obtain unsent scanned image data when scanned data transmission is stopped due to the network error by ejecting a HDD before the scan job times out.
[ "cpe:2.3:o:konicaminolta:bizhub_c750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c250i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c257i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c257i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_306i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_306i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_266i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_266i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_226i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_226i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c759_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c759:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c659_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c659:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c658_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c658:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_958_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_808_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_758_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_658e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_658e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c258_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c754e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c654e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_754e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_754e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_654e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_654e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c554e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c554e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c454e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c454e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c364e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c364e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c284e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c284e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c224e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c224e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_554e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_554e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_454e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_454e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_364e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_364e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_284e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_284e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_224e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_224e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c554_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c454_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c364_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c284_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3350i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3350i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4000i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4000i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3320i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3320i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4700i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4700i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851fs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851fs:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3351:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4752:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4052_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4052:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_246i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_246i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3850:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3850fs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3850fs:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4750:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3110:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3100p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3100p:-:*:*:*:*:*:*:*" ]
GHSA-cx2q-w5m9-hj67
DomainMOD through 4.11.01 has XSS via the admin/ssl-fields/add.php notes field for Custom SSL Fields.
[]
CVE-2019-10360
A stored cross site scripting vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier allowed attackers to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.
[ "cpe:2.3:a:jenkins:m2_release:*:*:*:*:*:jenkins:*:*" ]
CVE-2020-6514
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2022-41378
Online Pet Shop We App v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /pet_shop/admin/?page=inventory/manage_inventory.
[ "cpe:2.3:a:online_pet_shop_we_app_project:online_pet_shop_we_app:1.0:*:*:*:*:*:*:*" ]
GHSA-cf7q-c6xh-98hm
An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. The web application suffers from SQL injection on Adminlog.asp, Archivemsgs.asp, Deletelog.asp, Eventlog.asp, and Evmlog.asp.
[]
GHSA-94wf-249c-447p
Multiple PHP remote file inclusion vulnerabilities in Qt quickteam 2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) qte_web_path parameter to qte_web.php and the (2) qte_root parameter to bin/qte_init.php.
[]
GHSA-w46f-hrch-xgr2
The aclMatchExternal function in Squid before 2.6.STABLE7 allows remote attackers to cause a denial of service (crash) by causing an external_acl queue overload, which triggers an infinite loop.
[]
CVE-2025-21662
net/mlx5: Fix variable not being completed when function returns
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc_index(), fails cmd_work_handler() needs to complete ent->slotted before returning early. Otherwise the task which issued the command may hang: mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry INFO: task kworker/13:2:4055883 blocked for more than 120 seconds. Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/13:2 D 0 4055883 2 0x00000228 Workqueue: events mlx5e_tx_dim_work [mlx5_core] Call trace: __switch_to+0xe8/0x150 __schedule+0x2a8/0x9b8 schedule+0x2c/0x88 schedule_timeout+0x204/0x478 wait_for_common+0x154/0x250 wait_for_completion+0x28/0x38 cmd_exec+0x7a0/0xa00 [mlx5_core] mlx5_cmd_exec+0x54/0x80 [mlx5_core] mlx5_core_modify_cq+0x6c/0x80 [mlx5_core] mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core] mlx5e_tx_dim_work+0x54/0x68 [mlx5_core] process_one_work+0x1b0/0x448 worker_thread+0x54/0x468 kthread+0x134/0x138 ret_from_fork+0x10/0x18
[]
CVE-2019-19217
BMC Control-M/Agent 7.0.00.000 allows OS Command Injection.
[ "cpe:2.3:a:bmcsoftware:control-m\\/agent:7.0.00.000:*:*:*:*:*:*:*" ]
CVE-2017-7109
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
CVE-2020-28144
Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution.
[ "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*" ]
CVE-2022-28615
Read beyond bounds in ap_strcmp_match()
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*" ]
GHSA-vv92-932q-3jmg
An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to interact with devices in the account he should not have access to.
[]
CVE-2021-0132
Missing release of resource after effective lifetime in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network access.
[ "cpe:2.3:o:intel:secl-dc:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8321hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8360:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*" ]
CVE-2025-47962
Windows SDK Elevation of Privilege Vulnerability
Improper access control in Windows SDK allows an authorized attacker to elevate privileges locally.
[]
CVE-2021-46834
A permission bypass vulnerability in Huawei cross device task management could allow an attacker to access certain resource in the attacked devices. Affected product versions include:JAD-AL50 versions 102.0.0.225(C00E220R3P4).
[ "cpe:2.3:o:huawei:jad-al50_firmware:102.0.0.225\\(c00e220r3p4\\):*:*:*:*:*:*:*", "cpe:2.3:h:huawei:jad-al50:-:*:*:*:*:*:*:*" ]
CVE-2025-32686
WordPress Team Members <= 3.4.0 - PHP Object Injection Vulnerability
Deserialization of Untrusted Data vulnerability in WP Speedo Team Members allows Object Injection. This issue affects Team Members: from n/a through 3.4.0.
[]
GHSA-7gm3-hgj4-pgxq
This vulnerability exists in Digisol DG-GR6821AC Router due to storage of credentials and PINS without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted data stored in the firmware of targeted device.Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the network of the targeted device.
[]