id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2022-26709
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-50294
rxrpc: Fix missing locking causing hanging calls
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix missing locking causing hanging calls If a call gets aborted (e.g. because kafs saw a signal) between it being queued for connection and the I/O thread picking up the call, the abort will be prioritised over the connection and it will be removed from local->new_client_calls by rxrpc_disconnect_client_call() without a lock being held. This may cause other calls on the list to disappear if a race occurs. Fix this by taking the client_call_lock when removing a call from whatever list its ->wait_link happens to be on.
[]
null
null
null
null
null
CVE-2022-42012
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
[ "cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-pfmj-hvcm-jwh7
A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visit.php. The manipulation of the argument gname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
7.3
null
null
null
GHSA-hg4j-6gr9-jq8g
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_add_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to add new categories.
[]
null
4.3
null
null
null
GHSA-jq7w-hcx7-gm2r
In the Linux kernel, the following vulnerability has been resolved:ppp: do not assume bh is held in ppp_channel_bridge_input()Networking receive path is usually handled from BH handler. However, some protocols need to acquire the socket lock, and packets might be stored in the socket backlog is the socket was owned by a user process.In this case, release_sock(), __release_sock(), and sk_backlog_rcv() might call the sk->sk_backlog_rcv() handler in process context.sybot caught ppp was not considering this case in ppp_channel_bridge_input() :WARNING: inconsistent lock state 6.11.0-rc7-syzkaller-g5f5673607153 #0 Not taintedinconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. ksoftirqd/1/24 [HC0[0]:SC1[1]:HE1:SE0] takes: ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline] ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5759 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x48/0x60 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline] ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304 pppoe_rcv_core+0xfc/0x314 drivers/net/ppp/pppoe.c:379 sk_backlog_rcv include/net/sock.h:1111 [inline] __release_sock+0x1a8/0x3d8 net/core/sock.c:3004 release_sock+0x68/0x1b8 net/core/sock.c:3558 pppoe_sendmsg+0xc8/0x5d8 drivers/net/ppp/pppoe.c:903 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x374/0x4f4 net/socket.c:2204 __do_sys_sendto net/socket.c:2216 [inline] __se_sys_sendto net/socket.c:2212 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2212 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 irq event stamp: 282914 hardirqs last enabled at (282914): [<ffff80008b42e30c>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (282914): [<ffff80008b42e30c>] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (282913): [<ffff80008b42e13c>] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline] hardirqs last disabled at (282913): [<ffff80008b42e13c>] _raw_spin_lock_irqsave+0x2c/0x7c kernel/locking/spinlock.c:162 softirqs last enabled at (282904): [<ffff8000801f8e88>] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (282904): [<ffff8000801f8e88>] handle_softirqs+0xa3c/0xbfc kernel/softirq.c:582 softirqs last disabled at (282909): [<ffff8000801fbdf8>] run_ksoftirqd+0x70/0x158 kernel/softirq.c:928other info that might help us debug this: Possible unsafe locking scenario:lock(&pch->downl); <Interrupt> lock(&pch->downl);*** DEADLOCK ***1 lock held by ksoftirqd/1/24: #0: ffff80008f74dfa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:325stack backtrace: CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_sta ---truncated---
[]
null
5.5
null
null
null
CVE-2021-23853
Improper Input Validation of HTTP Headers
In Bosch IP cameras, improper validation of the HTTP header allows an attacker to inject arbitrary HTTP headers through crafted URLs.
[ "cpe:2.3:o:bosch:cpp4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:cpp4:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:cpp6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:cpp6:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:cpp7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:cpp7:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:cpp7.3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:cpp7.3:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:cpp13_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:cpp13:-:*:*:*:*:*:*:*" ]
null
8.3
null
null
null
GHSA-xfjx-x547-fx7v
An issue was discovered in /bin/mini_upnpd on D-Link DIR-619L 2.06beta devices. There is a heap buffer overflow allowing remote attackers to restart router via the M-search request ST parameter. No authentication required
[]
null
7.5
null
null
null
GHSA-m3v6-ff49-8q93
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending specifically crafted input to /tos/index.php?app/app_start_stop.
[]
null
9.8
null
null
null
GHSA-f8f7-wvqm-7wj3
SQL injection vulnerability in admin/index.php in phpList before 2.10.19 allows remote administrators to execute arbitrary SQL commands via the delete parameter to the editattributes page.
[]
null
null
null
null
null
CVE-2008-3572
Cross-site scripting (XSS) vulnerability in index.php in Pligg 9.9.5 allows remote attackers to inject arbitrary web script or HTML via the category parameter.
[ "cpe:2.3:a:pligg:pligg_cms:9.9.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-11454
Untrusted Search Path vulnerability in Autodesk Revit
A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized.
[ "cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2020-9015
Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands
[ "cpe:2.3:o:arista:dcs-7050qx-32s-r_firmware:4.20.9m:*:*:*:*:*:*:*", "cpe:2.3:h:arista:dcs-7050qx-32s-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:dcs-7050cx3-32s-r_firmware:4.20.11m:*:*:*:*:*:*:*", "cpe:2.3:h:arista:dcs-7050cx3-32s-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:dcs-7280sram-48c6-r_firmware:4.22.0.1f:*:*:*:*:*:*:*", "cpe:2.3:h:arista:dcs-7280sram-48c6-r:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-9xwq-p786-gg42
Unspecified vulnerability in the Settings component in the administration system in Jeebles Directory 2.9.60 allows remote authenticated administrators to execute arbitrary PHP code via unspecified vectors related to settings.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-gmcm-3fxg-fpm2
OSIsoft PI AF 2.6 and 2.7 and PI SQL for AF 2.1.2.19 do not ensure that the PI SQL (AF) Trusted Users group lacks the Everyone account, which allows remote authenticated users to bypass intended command restrictions via SQL statements.
[]
null
null
null
null
null
CVE-2021-25385
An improper input validation vulnerability in sdfffd_parse_chunk_PROP() in libsdffextractor library prior to SMR MAY-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
9
null
null
null
CVE-2021-43537
An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2005-1726
The CoreGraphics Window Server in Mac OS X 10.4.1 allows local users with console access to gain privileges by "launching commands into root sessions."
[ "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-cjrv-3xx9-58f9
The TLS implementation in Opera before 12.13 does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
[]
null
null
null
null
null
GHSA-v9r3-mcxc-m58r
A vulnerability was detected in cdevroe unmark up to 1.9.3. This affects an unknown part of the file /application/controllers/Marks.php. The manipulation of the argument url results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
2.1
6.3
null
null
null
RHSA-2017:0847
Red Hat Security Advisory: curl security update
curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.8
null
null
GHSA-25v2-jc2r-qvqg
Data leakage in cryptographic libraries for Intel IPP before 2019 update1 release may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
null
5.5
null
null
CVE-2004-2520
POP3 protocol in Gattaca Server 2003 1.1.10.0 allows remote authenticated users to cause a denial of service (application crash) via a large numeric value in the (1) LIST, (2) RETR, or (3) UIDL commands.
[ "cpe:2.3:o:geeos_team:gattaca_server_2003:1.1.10.0:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2012-4546
The default configuration for IPA servers in Red Hat Enterprise Linux 6, when revoking a certificate from an Identity Management replica, does not properly update another Identity Management replica, which causes inconsistent Certificate Revocation Lists (CRLs) to be used and might allow remote attackers to bypass intended access restrictions via a revoked certificate.
[ "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-22749
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
[ "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-h64x-jg3j-c589
Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.
[]
null
6.6
null
null
null
CVE-2000-1114
Unify ServletExec AS v3.0C allows remote attackers to read source code for JSP pages via an HTTP request that ends with characters such as ".", or "+", or "%20".
[ "cpe:2.3:a:unify:ewave_servletexec:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:unify:ewave_servletexec:3.0c:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2019-15302
The pad management logic in XWiki labs CryptPad before 3.0.0 allows a remote attacker (who has access to a Rich Text pad with editing rights for the URL) to corrupt it (i.e., cause data loss) via a trivial URL modification.
[ "cpe:2.3:a:xwiki:cryptpad:*:*:*:*:*:*:*:*" ]
null
6.5
null
5.5
null
GHSA-h327-v36r-6rgj
An issue was discovered in Samsung Mobile Processor, Automotive Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. The baseband software does not properly check format types specified by the RRC. This can lead to a lack of encryption.
[]
null
5.3
null
null
null
GHSA-q6gp-rjmw-h7qw
The Frontend File Manager Plugin WordPress plugin before 21.3 allows any authenticated users, such as subscriber, to rename a file to an arbitrary extension, like PHP, which could allow them to basically be able to upload arbitrary files on the server and achieve RCE
[]
null
8.8
null
null
null
CVE-2006-6281
PHP remote file inclusion vulnerability in check_status.php in dicshunary 0.1 alpha allows remote attackers to execute arbitrary PHP code via a URL in the dicshunary_root_path parameter.
[ "cpe:2.3:a:dicshunary:dicshunary:0.1_alpha:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2014-3628
Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object.
[ "cpe:2.3:a:apache:solr:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.0.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.10.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-mcf6-w793-99gq
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
[]
null
6.1
null
null
null
GHSA-7q35-3rwp-7fh3
NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.The specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21875.
[]
null
null
8.8
null
null
GHSA-m7mh-m68x-wqxx
VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host.
[]
null
null
8.8
null
null
CVE-2014-3076
IBM Business Process Manager (BPM) 8.5 through 8.5.5 allows remote attackers to obtain potentially sensitive information by visiting an unspecified JSP diagnostic page.
[ "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2021-34759
Cisco Identity Services Engine Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need valid administrative credentials.
[ "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch10:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch12:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch13:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch14:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch15:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch16:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch17:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch8:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch9:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch10:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch11:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch12:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch13:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch14:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch8:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch9:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*" ]
null
4.8
null
null
null
CVE-2015-7558
librsvg before 2.40.12 allows context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:librsvg:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-x5qv-3jp4-jf27
SQL injection vulnerability in ajax.php in Gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary SQL commands via the rsargs array parameter in an __exp__getFeedContent action.
[]
null
null
null
null
null
CVE-2014-9966
In all Android releases from CAF using the Linux kernel, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists in Secure Display.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7
7.6
null
GHSA-433f-68gw-5m8w
Unspecified vulnerability in the TACACS authentication component in Aruba Mobility Controller 3.1.x, 3.2.x, and 3.3.x allows remote authenticated users to gain privileges via unknown vectors.
[]
null
null
null
null
null
CVE-2023-29386
WordPress Manager for Icomoon plugin <= 2.0 - Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in Julien Crego Manager for Icomoon.This issue affects Manager for Icomoon: from n/a through 2.0.
[ "cpe:2.3:a:juliencrego:manager_for_icomoon:*:*:*:*:*:wordpress:*:*" ]
null
9.1
null
null
null
GHSA-prmh-4g2c-f5c8
Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI.
[]
null
7.5
null
null
null
GHSA-rj7h-v734-5679
The files_external app in ownCloud Server before 7.0.9, 8.0.x before 8.0.7, and 8.1.x before 8.1.2 allows remote authenticated users to instantiate arbitrary classes and possibly execute arbitrary code via a crafted mount point option, related to "objectstore."
[]
null
null
null
null
null
GHSA-gpjm-87qv-p73g
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0013 and CVE-2008-0014.
[]
null
null
null
null
null
CVE-2023-37659
xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE).
[ "cpe:2.3:a:xalpha_project:xalpha:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-r83r-pgp4-qf32
pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the organizationCode parameter at project.php.
[]
null
9.8
null
null
null
GHSA-jqrq-gqwg-r8r5
Windows Kernel Elevation of Privilege Vulnerability
[]
null
7.8
null
null
null
CVE-2006-5909
generaloptions.php in Paul Tarjan Stanford Conference And Research Forum (SCARF) before 20070227 does not require the admin privilege, which allows remote attackers to reconfigure the application or its user accounts.
[ "cpe:2.3:a:paul_tarjan:stanford_conference_and_research_forum:beta:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-6hxm-cj8c-h8v9
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Stack Group widget in all versions up to, and including, 3.10.7 due to insufficient input sanitization and output escaping on user supplied 'tooltip_position' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2019-3926
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to command injection via SNMP OID iso.3.6.1.4.1.3212.100.3.2.14.1. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
[ "cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*", "cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2007-6239
The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
[ "cpe:2.3:a:squid:squid_web_proxy_cache:2.0_patch2:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.1_patch2:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable4:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable5:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable2:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable4:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable6:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable7:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable11:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable12:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable13:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable14:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_.stable9:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable1:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable3:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable4:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable5:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable6:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable7:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable8:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable10:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable1:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable2:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable3:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable4:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable5:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable6:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable7:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable12:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable13:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable14:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable15:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable16:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre1:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre2:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre3:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2012-2368
Bytemark Symbiosis before Revision 1322 does not properly validate passwords, which allows remote attackers to gain access to email accounts via an arbitrary password.
[ "cpe:2.3:a:bytemark:symbiosis:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-j8cg-gpgg-pxf5
A Command injection vulnerability exists in Tenda AC10U AC1200 Smart Dual-band Wireless Router AC10U V1.0 Firmware V15.03.06.49_multi via the setUsbUnload functionality. The vulnerability is caused because the client controlled "deviceName" value is passed directly to the "doSystemCmd" function.
[]
null
null
null
null
null
GHSA-7237-f5g9-xg2m
Directory traversal vulnerability in cgi-bin/sddownload.cgi in D-link IP camera DCS-2103 with firmware 1.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
[]
null
null
null
null
null
GHSA-4gg5-pmq6-mj4h
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
[]
null
null
null
null
null
GHSA-9gjh-cfqr-c8q2
Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
[]
null
null
null
null
null
RHSA-2022:6243
Red Hat Security Advisory: kernel security and bug fix update
kernel: information leak in scsi_ioctl() kernel: kernel info leak issue in pfkey_register
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.1
null
null
null
CVE-2017-8994
A input validation vulnerability in HPE Operations Orchestration product all versions prior to 10.80, allows for the execution of code remotely.
[ "cpe:2.3:a:hp:operations_orchestration:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-7rg8-6m5r-jc3p
Directory traversal vulnerability in backend/template.php in Constructr CMS 3.02.5 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to create or read arbitrary files via directory traversal sequences in the edit_file parameter.
[]
null
null
null
null
null
CVE-2023-26577
Stored Cross-site Scripting In IDAttend’s IDWeb Application
Stored cross-site scripting in the IDAttend’s IDWeb application 3.1.052 and earlier allows attackers to hijack the browsing session of the logged in user.
[ "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-5mgj-mvv8-46mw
RubyGems does not verify SSL certificate
RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.
[]
null
null
null
null
null
GHSA-f48j-vwm8-858j
An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests.
[]
5.1
5.3
null
null
null
GHSA-qg5x-rr96-mrpg
The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.
[]
null
7.3
null
null
null
GHSA-j66j-8jmr-p8r5
Missing Authorization vulnerability in JoomUnited WP Media folder.This issue affects WP Media folder: from n/a through 5.7.2.
[]
null
5.4
null
null
null
GHSA-p48c-w36x-45wj
Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.
[]
null
6.8
null
null
null
GHSA-pf38-v6qj-j23h
Malfunction of CSRF token validation in Shopware
ImpactThe CSRF tokens were not renewed after login and logout. An attacker could impersonate the victim if the attacker is able to use the same device as the victim used beforehand.PatchesWe recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.htmlReferenceshttps://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
[]
null
7.5
null
null
null
CVE-2024-28825
Brute-force protection ineffective for some login methods
Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.
[ "cpe:2.3:a:checkmk:checkmk:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*" ]
null
5.9
null
null
null
GHSA-xc3v-wx52-jg7g
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the attack, as well as the IP addresses of the different IEC 61850 access points (of IEDs/products), to force the device to reboot, which renders the device inoperable for approximately 60 seconds. This vulnerability affects only products with IEC 61850 interfaces. This issue affects: Hitachi ABB Power Grids Relion 670 Series 1.1; 1.2.3 versions prior to 1.2.3.20; 2.0 versions prior to 2.0.0.13; 2.1; 2.2.2 versions prior to 2.2.2.3; 2.2.3 versions prior to 2.2.3.2. Hitachi ABB Power Grids Relion 670/650 Series 2.2.0 versions prior to 2.2.0.13. Hitachi ABB Power Grids Relion 670/650/SAM600-IO 2.2.1 versions prior to 2.2.1.6. Hitachi ABB Power Grids Relion 650 1.1; 1.2; 1.3 versions prior to 1.3.0.7. Hitachi ABB Power Grids REB500 7.3; 7.4; 7.5; 7.6; 8.2; 8.3. Hitachi ABB Power Grids RTU500 Series 7.x version 7.x and prior versions; 8.x version 8.x and prior versions; 9.x version 9.x and prior versions; 10.x version 10.x and prior versions; 11.x version 11.x and prior versions; 12.x version 12.x and prior versions. Hitachi ABB Power Grids FOX615 (TEGO1) R1D02 version R1D02 and prior versions. Hitachi ABB Power Grids MSM 2.1.0 versions prior to 2.1.0. Hitachi ABB Power Grids GMS600 1.3.0 version 1.3.0 and prior versions. Hitachi ABB Power Grids PWC600 1.0 versions prior to 1.0.1.4; 1.1 versions prior to 1.1.0.1.
[]
null
7.5
null
null
null
RHSA-2024:1561
Red Hat Security Advisory: Red Hat build of MicroShift 4.15.6 security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
null
GHSA-rwhv-4jcg-g276
In the Linux kernel, the following vulnerability has been resolved:wifi: ath10k: Fix memory leak in management txIn the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic.Kmemleak reports this problem as below,unreferenced object 0xffffff80b64ed250 (size 16): comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s) hex dump (first 16 bytes): 00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00 .+.......t...... backtrace: [<ffffffe6e7b245dc>] __kmem_cache_alloc_node+0x1e4/0x2d8 [<ffffffe6e7adde88>] kmalloc_trace+0x48/0x110 [<ffffffe6bbd765fc>] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core] [<ffffffe6bbd3eed4>] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core] [<ffffffe6e78d5974>] process_scheduled_works+0x1ac/0x400 [<ffffffe6e78d60b8>] worker_thread+0x208/0x328 [<ffffffe6e78dc890>] kthread+0x100/0x1c0 [<ffffffe6e78166c0>] ret_from_fork+0x10/0x20Free the memory during completion and cleanup to fix the leak.Protect the mgmt_pending_tx idr_remove() operation in ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar->data_lock similar to other instances.Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
[]
null
5.5
null
null
null
CVE-2020-10446
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-category.php by adding a question mark (?) followed by the payload.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
RHSA-2011:0356
Red Hat Security Advisory: krb5 security update
(krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-gvc8-7r7h-crrj
IBM Security Guardium 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174852.
[]
null
null
null
null
null
GHSA-7x2q-v99p-jm92
The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
[]
null
null
null
null
null
CVE-1999-1113
Buffer overflow in Eudora Internet Mail Server (EIMS) 2.01 and earlier on MacOS systems allows remote attackers to cause a denial of service via a long USER command to port 106.
[ "cpe:2.3:a:eudora:internet_mail_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:eudora:internet_mail_server:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:eudora:internet_mail_server:2.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-4px7-qcwc-69rh
An Improper Input Validation Vulnerability exists when reading a BMP file using Open Design Alliance Drawings SDK before 2022.12. Crafted data in a BMP file can trigger a write operation past the end of an allocated buffer, or lead to a heap-based buffer overflow. An attacker can leverage this vulnerability to execute code in the context of the current process.
[]
null
null
null
null
null
RHSA-2023:7551
Red Hat Security Advisory: kernel-rt security update
kernel: use after free in nvmet_tcp_free_crypto in NVMe hw: amd: Cross-Process Information Leak
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
6.5
null
null
null
CVE-2021-3239
E-Learning System 1.0 suffers from an unauthenticated SQL injection vulnerability, which allows remote attackers to execute arbitrary code on the hosting web server and gain a reverse shell.
[ "cpe:2.3:a:e-learning_system_project:e-learning_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-ggmj-ggxx-7wcg
A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects an unknown part of the file mailing_lists.shtm. The manipulation of the argument name/userList/address results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
[]
2
3.5
null
null
null
GHSA-xwpj-2694-4phc
In pb_write of pb_encode.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178754781
[]
null
null
null
null
null
GHSA-rx3f-6c7m-5whv
Unspecified vulnerability in the Network Controller in Xerox WorkCentre 6400 System Software 060.070.109.11407 through 060.070.109.29510, and Net Controller 060.079.11410 through 060.079.29310, allows remote attackers to access "directory structure" via a crafted PostScript file, aka "Unauthorized Directory Structure Access Vulnerability."
[]
null
null
null
null
null
CVE-2012-4857
Buffer overflow in IBM Informix 11.50 through 11.50.xC9W2 and 11.70 before 11.70.xC7 allows remote authenticated users to execute arbitrary code via a crafted SQL statement.
[ "cpe:2.3:a:ibm:informix_dynamic_server:11.50:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc3w1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc4w1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5w2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5w3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc5w4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc6w4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc7w4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc8w4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.70.xc1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.70.xc2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.70.xc3:*:*:*:*:*:*:*" ]
null
null
null
9
null
CVE-2016-8737
In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site request forgery (CSRF), which could permit a malicious web site to produce a link which, if clicked whilst a user is logged in to Brooklyn, would cause the server to execute the attacker's commands as the user. There is known to be a proof-of-concept exploit using this vulnerability.
[ "cpe:2.3:a:apache:brooklyn:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2008-1219
SQL injection vulnerability in the Kutub-i Sitte (KutubiSitte) 1.1 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the kid parameter in a hadisgoster action to modules.php.
[ "cpe:2.3:a:phpnuke:kutubisitte_component:1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
ICSA-22-109-05
Elcomplus SmartPTT SCADA Server
An authenticated attacker can inject arbitrary JavaScript into critical parameters.CVE-2021-43932 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An unauthenticated user can request various files from the server without any authentication or authorization.CVE-2021-43938 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The server has a feature that allows the upload of application updates; however, validation is not required, which enables malicious users to upload arbitrary files.CVE-2021-43934 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize dot slash sequences that can resolve to a location that is outside of that directory.CVE-2021-43930 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.CVE-2021-43937 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
[]
null
null
7.6
null
null
CVE-1999-0983
Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
[ "cpe:2.3:a:internic:whois_lookup:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-jqff-3935-jcw9
drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.
[]
null
7.8
null
null
null
GHSA-4q6j-qgrq-8x6x
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-1999-1086
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.
[ "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:4.11:sp5b:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-wpm6-6374-m3g5
A vulnerability was found in phpRecDB 1.3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument r/view leads to cross site scripting. The attack may be launched remotely. VDB-237194 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
3.5
null
null
GHSA-6j82-xvg5-hgf6
An information leakage vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows disclosure of product license features.
[]
null
null
5.3
null
null
CVE-2014-4060
Use-after-free vulnerability in MCPlayer.dll in Microsoft Windows Media Center TV Pack for Windows Vista, Windows 7 SP1, and Windows Media Center for Windows 8 and 8.1 allows remote attackers to execute arbitrary code via a crafted Office document that triggers deletion of a CSyncBasePlayer object, aka "CSyncBasePlayer Use After Free Vulnerability."
[ "cpe:2.3:a:microsoft:windows_media_center:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:professional:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:professional:*:*:*", "cpe:2.3:a:microsoft:windows_media_center_tv_pack:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:enterprise:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:enterprise_kn:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:enterprise_n:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:home_premium:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:home_premium_kn:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:home_premium_n:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:professional:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:professional_kn:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:professional_n:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate_kn:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2024-12364
SQLi in Mavi Yeşil Software's Guest Tracking Software
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mavi Yeşil Software Guest Tracking Software allows SQL Injection.This issue affects .  NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.
[]
null
9.8
null
null
null
CVE-2019-18379
Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a server-side request forgery (SSRF) exploit, which is a type of issue that can let an attacker send crafted requests from the backend server of a vulnerable web application or access services available through the loopback interface.
[ "cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:*" ]
null
7.3
null
7.5
null
GHSA-w98j-hpp8-cqf9
siteadmin/adduser.php in Customer Paradigm PageDirector CMS does not properly restrict access, which allows remote attackers to bypass intended restrictions and add administrative users via a direct request.
[]
null
null
null
null
null
CVE-2018-18987
VT-Designer Version 2.1.7.31 is vulnerable by the program populating objects with user supplied input via a file without first checking for validity, allowing attacker supplied input to be written to known memory locations. This may cause the program to crash or allow remote code execution.
[ "cpe:2.3:a:invt:vt-designer:2.1.7.31:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2001-0750
Cisco IOS 12.1(2)T, 12.1(3)T allow remote attackers to cause a denial of service (reload) via a connection to TCP ports 3100-3999, 5100-5999, 7100-7999 and 10100-10999.
[ "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-5113
Authenticated Remote Command Injection in Diviotec NBR IP Cameras
The Diviotec professional series exposes a web interface. One endpoint is vulnerable to arbitrary command injection and hardcoded passwords are used.
[]
8.6
null
null
null
null
GHSA-chfr-83gv-5hhp
WebKit in Apple iOS before 9.3 does not prevent hidden web views from reading orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment via a crafted web site.
[]
null
null
4.3
null
null