id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-26709
|
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-50294
|
rxrpc: Fix missing locking causing hanging calls
|
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix missing locking causing hanging calls
If a call gets aborted (e.g. because kafs saw a signal) between it being
queued for connection and the I/O thread picking up the call, the abort
will be prioritised over the connection and it will be removed from
local->new_client_calls by rxrpc_disconnect_client_call() without a lock
being held. This may cause other calls on the list to disappear if a race
occurs.
Fix this by taking the client_call_lock when removing a call from whatever
list its ->wait_link happens to be on.
|
[] | null | null | null | null | null |
CVE-2022-42012
|
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
|
[
"cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-pfmj-hvcm-jwh7
|
A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visit.php. The manipulation of the argument gname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
GHSA-hg4j-6gr9-jq8g
|
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_add_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to add new categories.
|
[] | null | 4.3 | null | null | null |
|
GHSA-jq7w-hcx7-gm2r
|
In the Linux kernel, the following vulnerability has been resolved:ppp: do not assume bh is held in ppp_channel_bridge_input()Networking receive path is usually handled from BH handler.
However, some protocols need to acquire the socket lock, and
packets might be stored in the socket backlog is the socket was
owned by a user process.In this case, release_sock(), __release_sock(), and sk_backlog_rcv()
might call the sk->sk_backlog_rcv() handler in process context.sybot caught ppp was not considering this case in
ppp_channel_bridge_input() :WARNING: inconsistent lock state
6.11.0-rc7-syzkaller-g5f5673607153 #0 Not taintedinconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage.
ksoftirqd/1/24 [HC0[0]:SC1[1]:HE1:SE0] takes:
ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
{SOFTIRQ-ON-W} state was registered at:
lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5759
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x48/0x60 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:351 [inline]
ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
pppoe_rcv_core+0xfc/0x314 drivers/net/ppp/pppoe.c:379
sk_backlog_rcv include/net/sock.h:1111 [inline]
__release_sock+0x1a8/0x3d8 net/core/sock.c:3004
release_sock+0x68/0x1b8 net/core/sock.c:3558
pppoe_sendmsg+0xc8/0x5d8 drivers/net/ppp/pppoe.c:903
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
__sys_sendto+0x374/0x4f4 net/socket.c:2204
__do_sys_sendto net/socket.c:2216 [inline]
__se_sys_sendto net/socket.c:2212 [inline]
__arm64_sys_sendto+0xd8/0xf8 net/socket.c:2212
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
irq event stamp: 282914
hardirqs last enabled at (282914): [<ffff80008b42e30c>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
hardirqs last enabled at (282914): [<ffff80008b42e30c>] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194
hardirqs last disabled at (282913): [<ffff80008b42e13c>] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline]
hardirqs last disabled at (282913): [<ffff80008b42e13c>] _raw_spin_lock_irqsave+0x2c/0x7c kernel/locking/spinlock.c:162
softirqs last enabled at (282904): [<ffff8000801f8e88>] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last enabled at (282904): [<ffff8000801f8e88>] handle_softirqs+0xa3c/0xbfc kernel/softirq.c:582
softirqs last disabled at (282909): [<ffff8000801fbdf8>] run_ksoftirqd+0x70/0x158 kernel/softirq.c:928other info that might help us debug this:
Possible unsafe locking scenario:lock(&pch->downl);
<Interrupt>
lock(&pch->downl);*** DEADLOCK ***1 lock held by ksoftirqd/1/24:
#0: ffff80008f74dfa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:325stack backtrace:
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call trace:
dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326
__dump_sta
---truncated---
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-23853
|
Improper Input Validation of HTTP Headers
|
In Bosch IP cameras, improper validation of the HTTP header allows an attacker to inject arbitrary HTTP headers through crafted URLs.
|
[
"cpe:2.3:o:bosch:cpp4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp7.3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp7.3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:cpp13_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:cpp13:-:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
GHSA-xfjx-x547-fx7v
|
An issue was discovered in /bin/mini_upnpd on D-Link DIR-619L 2.06beta devices. There is a heap buffer overflow allowing remote attackers to restart router via the M-search request ST parameter. No authentication required
|
[] | null | 7.5 | null | null | null |
|
GHSA-m3v6-ff49-8q93
|
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending specifically crafted input to /tos/index.php?app/app_start_stop.
|
[] | null | 9.8 | null | null | null |
|
GHSA-f8f7-wvqm-7wj3
|
SQL injection vulnerability in admin/index.php in phpList before 2.10.19 allows remote administrators to execute arbitrary SQL commands via the delete parameter to the editattributes page.
|
[] | null | null | null | null | null |
|
CVE-2008-3572
|
Cross-site scripting (XSS) vulnerability in index.php in Pligg 9.9.5 allows remote attackers to inject arbitrary web script or HTML via the category parameter.
|
[
"cpe:2.3:a:pligg:pligg_cms:9.9.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-11454
|
Untrusted Search Path vulnerability in Autodesk Revit
|
A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized.
|
[
"cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2020-9015
|
Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands
|
[
"cpe:2.3:o:arista:dcs-7050qx-32s-r_firmware:4.20.9m:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:dcs-7050qx-32s-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:dcs-7050cx3-32s-r_firmware:4.20.11m:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:dcs-7050cx3-32s-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:dcs-7280sram-48c6-r_firmware:4.22.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:dcs-7280sram-48c6-r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-9xwq-p786-gg42
|
Unspecified vulnerability in the Settings component in the administration system in Jeebles Directory 2.9.60 allows remote authenticated administrators to execute arbitrary PHP code via unspecified vectors related to settings.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-gmcm-3fxg-fpm2
|
OSIsoft PI AF 2.6 and 2.7 and PI SQL for AF 2.1.2.19 do not ensure that the PI SQL (AF) Trusted Users group lacks the Everyone account, which allows remote authenticated users to bypass intended command restrictions via SQL statements.
|
[] | null | null | null | null | null |
|
CVE-2021-25385
|
An improper input validation vulnerability in sdfffd_parse_chunk_PROP() in libsdffextractor library prior to SMR MAY-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process.
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 9 | null | null | null |
|
CVE-2021-43537
|
An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2005-1726
|
The CoreGraphics Window Server in Mac OS X 10.4.1 allows local users with console access to gain privileges by "launching commands into root sessions."
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-cjrv-3xx9-58f9
|
The TLS implementation in Opera before 12.13 does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
|
[] | null | null | null | null | null |
|
GHSA-v9r3-mcxc-m58r
|
A vulnerability was detected in cdevroe unmark up to 1.9.3. This affects an unknown part of the file /application/controllers/Marks.php. The manipulation of the argument url results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 2.1 | 6.3 | null | null | null |
|
RHSA-2017:0847
|
Red Hat Security Advisory: curl security update
|
curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.8 | null | null |
GHSA-25v2-jc2r-qvqg
|
Data leakage in cryptographic libraries for Intel IPP before 2019 update1 release may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | null | null | 5.5 | null | null |
|
CVE-2004-2520
|
POP3 protocol in Gattaca Server 2003 1.1.10.0 allows remote authenticated users to cause a denial of service (application crash) via a large numeric value in the (1) LIST, (2) RETR, or (3) UIDL commands.
|
[
"cpe:2.3:o:geeos_team:gattaca_server_2003:1.1.10.0:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2012-4546
|
The default configuration for IPA servers in Red Hat Enterprise Linux 6, when revoking a certificate from an Identity Management replica, does not properly update another Identity Management replica, which causes inconsistent Certificate Revocation Lists (CRLs) to be used and might allow remote attackers to bypass intended access restrictions via a revoked certificate.
|
[
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-22749
|
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
|
[
"cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-h64x-jg3j-c589
|
Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.
|
[] | null | 6.6 | null | null | null |
|
CVE-2000-1114
|
Unify ServletExec AS v3.0C allows remote attackers to read source code for JSP pages via an HTTP request that ends with characters such as ".", or "+", or "%20".
|
[
"cpe:2.3:a:unify:ewave_servletexec:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:unify:ewave_servletexec:3.0c:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2019-15302
|
The pad management logic in XWiki labs CryptPad before 3.0.0 allows a remote attacker (who has access to a Rich Text pad with editing rights for the URL) to corrupt it (i.e., cause data loss) via a trivial URL modification.
|
[
"cpe:2.3:a:xwiki:cryptpad:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 5.5 | null |
|
GHSA-h327-v36r-6rgj
|
An issue was discovered in Samsung Mobile Processor, Automotive Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. The baseband software does not properly check format types specified by the RRC. This can lead to a lack of encryption.
|
[] | null | 5.3 | null | null | null |
|
GHSA-q6gp-rjmw-h7qw
|
The Frontend File Manager Plugin WordPress plugin before 21.3 allows any authenticated users, such as subscriber, to rename a file to an arbitrary extension, like PHP, which could allow them to basically be able to upload arbitrary files on the server and achieve RCE
|
[] | null | 8.8 | null | null | null |
|
CVE-2006-6281
|
PHP remote file inclusion vulnerability in check_status.php in dicshunary 0.1 alpha allows remote attackers to execute arbitrary PHP code via a URL in the dicshunary_root_path parameter.
|
[
"cpe:2.3:a:dicshunary:dicshunary:0.1_alpha:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2014-3628
|
Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object.
|
[
"cpe:2.3:a:apache:solr:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-mcf6-w793-99gq
|
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
|
[] | null | 6.1 | null | null | null |
|
GHSA-7q35-3rwp-7fh3
|
NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.The specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21875.
|
[] | null | null | 8.8 | null | null |
|
GHSA-m7mh-m68x-wqxx
|
VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host.
|
[] | null | null | 8.8 | null | null |
|
CVE-2014-3076
|
IBM Business Process Manager (BPM) 8.5 through 8.5.5 allows remote attackers to obtain potentially sensitive information by visiting an unspecified JSP diagnostic page.
|
[
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-34759
|
Cisco Identity Services Engine Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need valid administrative credentials.
|
[
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch10:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch12:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch13:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch14:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch15:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch16:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch17:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch10:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch11:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch12:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch13:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch14:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
CVE-2015-7558
|
librsvg before 2.40.12 allows context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:librsvg:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-x5qv-3jp4-jf27
|
SQL injection vulnerability in ajax.php in Gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary SQL commands via the rsargs array parameter in an __exp__getFeedContent action.
|
[] | null | null | null | null | null |
|
CVE-2014-9966
|
In all Android releases from CAF using the Linux kernel, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists in Secure Display.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 | null |
|
GHSA-433f-68gw-5m8w
|
Unspecified vulnerability in the TACACS authentication component in Aruba Mobility Controller 3.1.x, 3.2.x, and 3.3.x allows remote authenticated users to gain privileges via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-29386
|
WordPress Manager for Icomoon plugin <= 2.0 - Arbitrary File Upload vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in Julien Crego Manager for Icomoon.This issue affects Manager for Icomoon: from n/a through 2.0.
|
[
"cpe:2.3:a:juliencrego:manager_for_icomoon:*:*:*:*:*:wordpress:*:*"
] | null | 9.1 | null | null | null |
GHSA-prmh-4g2c-f5c8
|
Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI.
|
[] | null | 7.5 | null | null | null |
|
GHSA-rj7h-v734-5679
|
The files_external app in ownCloud Server before 7.0.9, 8.0.x before 8.0.7, and 8.1.x before 8.1.2 allows remote authenticated users to instantiate arbitrary classes and possibly execute arbitrary code via a crafted mount point option, related to "objectstore."
|
[] | null | null | null | null | null |
|
GHSA-gpjm-87qv-p73g
|
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0013 and CVE-2008-0014.
|
[] | null | null | null | null | null |
|
CVE-2023-37659
|
xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE).
|
[
"cpe:2.3:a:xalpha_project:xalpha:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-r83r-pgp4-qf32
|
pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the organizationCode parameter at project.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-jqrq-gqwg-r8r5
|
Windows Kernel Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2006-5909
|
generaloptions.php in Paul Tarjan Stanford Conference And Research Forum (SCARF) before 20070227 does not require the admin privilege, which allows remote attackers to reconfigure the application or its user accounts.
|
[
"cpe:2.3:a:paul_tarjan:stanford_conference_and_research_forum:beta:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-6hxm-cj8c-h8v9
|
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Stack Group widget in all versions up to, and including, 3.10.7 due to insufficient input sanitization and output escaping on user supplied 'tooltip_position' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2019-3926
|
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to command injection via SNMP OID iso.3.6.1.4.1.3212.100.3.2.14.1. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
|
[
"cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2007-6239
|
The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
|
[
"cpe:2.3:a:squid:squid_web_proxy_cache:2.0_patch2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.1_patch2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_.stable9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable15:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable16:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre3:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-2368
|
Bytemark Symbiosis before Revision 1322 does not properly validate passwords, which allows remote attackers to gain access to email accounts via an arbitrary password.
|
[
"cpe:2.3:a:bytemark:symbiosis:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-j8cg-gpgg-pxf5
|
A Command injection vulnerability exists in Tenda AC10U AC1200 Smart Dual-band Wireless Router AC10U V1.0 Firmware V15.03.06.49_multi via the setUsbUnload functionality. The vulnerability is caused because the client controlled "deviceName" value is passed directly to the "doSystemCmd" function.
|
[] | null | null | null | null | null |
|
GHSA-7237-f5g9-xg2m
|
Directory traversal vulnerability in cgi-bin/sddownload.cgi in D-link IP camera DCS-2103 with firmware 1.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
[] | null | null | null | null | null |
|
GHSA-4gg5-pmq6-mj4h
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | null | null | null |
|
GHSA-9gjh-cfqr-c8q2
|
Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
|
[] | null | null | null | null | null |
|
RHSA-2022:6243
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: information leak in scsi_ioctl() kernel: kernel info leak issue in pfkey_register
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.1 | null | null | null |
CVE-2017-8994
|
A input validation vulnerability in HPE Operations Orchestration product all versions prior to 10.80, allows for the execution of code remotely.
|
[
"cpe:2.3:a:hp:operations_orchestration:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-7rg8-6m5r-jc3p
|
Directory traversal vulnerability in backend/template.php in Constructr CMS 3.02.5 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to create or read arbitrary files via directory traversal sequences in the edit_file parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-26577
|
Stored Cross-site Scripting In IDAttend’s IDWeb Application
|
Stored cross-site scripting in the IDAttend’s IDWeb application 3.1.052 and earlier allows attackers to hijack the browsing session of the logged in user.
|
[
"cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-5mgj-mvv8-46mw
|
RubyGems does not verify SSL certificate
|
RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.
|
[] | null | null | null | null | null |
GHSA-f48j-vwm8-858j
|
An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests.
|
[] | 5.1 | 5.3 | null | null | null |
|
GHSA-qg5x-rr96-mrpg
|
The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.
|
[] | null | 7.3 | null | null | null |
|
GHSA-j66j-8jmr-p8r5
|
Missing Authorization vulnerability in JoomUnited WP Media folder.This issue affects WP Media folder: from n/a through 5.7.2.
|
[] | null | 5.4 | null | null | null |
|
GHSA-p48c-w36x-45wj
|
Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.
|
[] | null | 6.8 | null | null | null |
|
GHSA-pf38-v6qj-j23h
|
Malfunction of CSRF token validation in Shopware
|
ImpactThe CSRF tokens were not renewed after login and logout.
An attacker could impersonate the victim if the attacker is able to use the same device as the victim used beforehand.PatchesWe recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.htmlReferenceshttps://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
|
[] | null | 7.5 | null | null | null |
CVE-2024-28825
|
Brute-force protection ineffective for some login methods
|
Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.
|
[
"cpe:2.3:a:checkmk:checkmk:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-xc3v-wx52-jg7g
|
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the attack, as well as the IP addresses of the different IEC 61850 access points (of IEDs/products), to force the device to reboot, which renders the device inoperable for approximately 60 seconds. This vulnerability affects only products with IEC 61850 interfaces. This issue affects: Hitachi ABB Power Grids Relion 670 Series 1.1; 1.2.3 versions prior to 1.2.3.20; 2.0 versions prior to 2.0.0.13; 2.1; 2.2.2 versions prior to 2.2.2.3; 2.2.3 versions prior to 2.2.3.2. Hitachi ABB Power Grids Relion 670/650 Series 2.2.0 versions prior to 2.2.0.13. Hitachi ABB Power Grids Relion 670/650/SAM600-IO 2.2.1 versions prior to 2.2.1.6. Hitachi ABB Power Grids Relion 650 1.1; 1.2; 1.3 versions prior to 1.3.0.7. Hitachi ABB Power Grids REB500 7.3; 7.4; 7.5; 7.6; 8.2; 8.3. Hitachi ABB Power Grids RTU500 Series 7.x version 7.x and prior versions; 8.x version 8.x and prior versions; 9.x version 9.x and prior versions; 10.x version 10.x and prior versions; 11.x version 11.x and prior versions; 12.x version 12.x and prior versions. Hitachi ABB Power Grids FOX615 (TEGO1) R1D02 version R1D02 and prior versions. Hitachi ABB Power Grids MSM 2.1.0 versions prior to 2.1.0. Hitachi ABB Power Grids GMS600 1.3.0 version 1.3.0 and prior versions. Hitachi ABB Power Grids PWC600 1.0 versions prior to 1.0.1.4; 1.1 versions prior to 1.1.0.1.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2024:1561
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.15.6 security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null | null |
GHSA-rwhv-4jcg-g276
|
In the Linux kernel, the following vulnerability has been resolved:wifi: ath10k: Fix memory leak in management txIn the current logic, memory is allocated for storing the MSDU context
during management packet TX but this memory is not being freed during
management TX completion. Similar leaks are seen in the management TX
cleanup logic.Kmemleak reports this problem as below,unreferenced object 0xffffff80b64ed250 (size 16):
comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
hex dump (first 16 bytes):
00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00 .+.......t......
backtrace:
[<ffffffe6e7b245dc>] __kmem_cache_alloc_node+0x1e4/0x2d8
[<ffffffe6e7adde88>] kmalloc_trace+0x48/0x110
[<ffffffe6bbd765fc>] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
[<ffffffe6bbd3eed4>] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
[<ffffffe6e78d5974>] process_scheduled_works+0x1ac/0x400
[<ffffffe6e78d60b8>] worker_thread+0x208/0x328
[<ffffffe6e78dc890>] kthread+0x100/0x1c0
[<ffffffe6e78166c0>] ret_from_fork+0x10/0x20Free the memory during completion and cleanup to fix the leak.Protect the mgmt_pending_tx idr_remove() operation in
ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar->data_lock similar to
other instances.Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
|
[] | null | 5.5 | null | null | null |
|
CVE-2020-10446
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-category.php by adding a question mark (?) followed by the payload.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
RHSA-2011:0356
|
Red Hat Security Advisory: krb5 security update
|
(krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-gvc8-7r7h-crrj
|
IBM Security Guardium 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174852.
|
[] | null | null | null | null | null |
|
GHSA-7x2q-v99p-jm92
|
The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
|
[] | null | null | null | null | null |
|
CVE-1999-1113
|
Buffer overflow in Eudora Internet Mail Server (EIMS) 2.01 and earlier on MacOS systems allows remote attackers to cause a denial of service via a long USER command to port 106.
|
[
"cpe:2.3:a:eudora:internet_mail_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:eudora:internet_mail_server:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:eudora:internet_mail_server:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-4px7-qcwc-69rh
|
An Improper Input Validation Vulnerability exists when reading a BMP file using Open Design Alliance Drawings SDK before 2022.12. Crafted data in a BMP file can trigger a write operation past the end of an allocated buffer, or lead to a heap-based buffer overflow. An attacker can leverage this vulnerability to execute code in the context of the current process.
|
[] | null | null | null | null | null |
|
RHSA-2023:7551
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: use after free in nvmet_tcp_free_crypto in NVMe hw: amd: Cross-Process Information Leak
|
[
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 6.5 | null | null | null |
CVE-2021-3239
|
E-Learning System 1.0 suffers from an unauthenticated SQL injection vulnerability, which allows remote attackers to execute arbitrary code on the hosting web server and gain a reverse shell.
|
[
"cpe:2.3:a:e-learning_system_project:e-learning_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-ggmj-ggxx-7wcg
|
A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects an unknown part of the file mailing_lists.shtm. The manipulation of the argument name/userList/address results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
|
[] | 2 | 3.5 | null | null | null |
|
GHSA-xwpj-2694-4phc
|
In pb_write of pb_encode.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178754781
|
[] | null | null | null | null | null |
|
GHSA-rx3f-6c7m-5whv
|
Unspecified vulnerability in the Network Controller in Xerox WorkCentre 6400 System Software 060.070.109.11407 through 060.070.109.29510, and Net Controller 060.079.11410 through 060.079.29310, allows remote attackers to access "directory structure" via a crafted PostScript file, aka "Unauthorized Directory Structure Access Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2012-4857
|
Buffer overflow in IBM Informix 11.50 through 11.50.xC9W2 and 11.70 before 11.70.xC7 allows remote authenticated users to execute arbitrary code via a crafted SQL statement.
|
[
"cpe:2.3:a:ibm:informix_dynamic_server:11.50:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc3w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc4w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5w2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5w3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5w4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.70.xc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.70.xc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.70.xc3:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2016-8737
|
In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site request forgery (CSRF), which could permit a malicious web site to produce a link which, if clicked whilst a user is logged in to Brooklyn, would cause the server to execute the attacker's commands as the user. There is known to be a proof-of-concept exploit using this vulnerability.
|
[
"cpe:2.3:a:apache:brooklyn:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2008-1219
|
SQL injection vulnerability in the Kutub-i Sitte (KutubiSitte) 1.1 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the kid parameter in a hadisgoster action to modules.php.
|
[
"cpe:2.3:a:phpnuke:kutubisitte_component:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
ICSA-22-109-05
|
Elcomplus SmartPTT SCADA Server
|
An authenticated attacker can inject arbitrary JavaScript into critical parameters.CVE-2021-43932 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An unauthenticated user can request various files from the server without any authentication or authorization.CVE-2021-43938 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The server has a feature that allows the upload of application updates; however, validation is not required, which enables malicious users to upload arbitrary files.CVE-2021-43934 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize dot slash sequences that can resolve to a location that is outside of that directory.CVE-2021-43930 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.CVE-2021-43937 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
|
[] | null | null | 7.6 | null | null |
CVE-1999-0983
|
Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
|
[
"cpe:2.3:a:internic:whois_lookup:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jqff-3935-jcw9
|
drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.
|
[] | null | 7.8 | null | null | null |
|
GHSA-4q6j-qgrq-8x6x
|
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-1999-1086
|
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.
|
[
"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:4.11:sp5b:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-wpm6-6374-m3g5
|
A vulnerability was found in phpRecDB 1.3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument r/view leads to cross site scripting. The attack may be launched remotely. VDB-237194 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 3.5 | null | null |
|
GHSA-6j82-xvg5-hgf6
|
An information leakage vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows disclosure of product license features.
|
[] | null | null | 5.3 | null | null |
|
CVE-2014-4060
|
Use-after-free vulnerability in MCPlayer.dll in Microsoft Windows Media Center TV Pack for Windows Vista, Windows 7 SP1, and Windows Media Center for Windows 8 and 8.1 allows remote attackers to execute arbitrary code via a crafted Office document that triggers deletion of a CSyncBasePlayer object, aka "CSyncBasePlayer Use After Free Vulnerability."
|
[
"cpe:2.3:a:microsoft:windows_media_center:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:professional:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:professional:*:*:*",
"cpe:2.3:a:microsoft:windows_media_center_tv_pack:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:enterprise:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:enterprise_kn:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:enterprise_n:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:home_premium:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:home_premium_kn:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:home_premium_n:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:professional:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:professional_kn:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:professional_n:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate_kn:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-12364
|
SQLi in Mavi Yeşil Software's Guest Tracking Software
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mavi Yeşil Software Guest Tracking Software allows SQL Injection.This issue affects . NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.
|
[] | null | 9.8 | null | null | null |
CVE-2019-18379
|
Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a server-side request forgery (SSRF) exploit, which is a type of issue that can let an attacker send crafted requests from the backend server of a vulnerable web application or access services available through the loopback interface.
|
[
"cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | 7.5 | null |
|
GHSA-w98j-hpp8-cqf9
|
siteadmin/adduser.php in Customer Paradigm PageDirector CMS does not properly restrict access, which allows remote attackers to bypass intended restrictions and add administrative users via a direct request.
|
[] | null | null | null | null | null |
|
CVE-2018-18987
|
VT-Designer Version 2.1.7.31 is vulnerable by the program populating objects with user supplied input via a file without first checking for validity, allowing attacker supplied input to be written to known memory locations. This may cause the program to crash or allow remote code execution.
|
[
"cpe:2.3:a:invt:vt-designer:2.1.7.31:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2001-0750
|
Cisco IOS 12.1(2)T, 12.1(3)T allow remote attackers to cause a denial of service (reload) via a connection to TCP ports 3100-3999, 5100-5999, 7100-7999 and 10100-10999.
|
[
"cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2025-5113
|
Authenticated Remote Command Injection in Diviotec NBR IP Cameras
|
The Diviotec professional series exposes a web interface. One endpoint is vulnerable to arbitrary command injection and hardcoded passwords are used.
|
[] | 8.6 | null | null | null | null |
GHSA-chfr-83gv-5hhp
|
WebKit in Apple iOS before 9.3 does not prevent hidden web views from reading orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment via a crafted web site.
|
[] | null | null | 4.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.