id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2022-22329
IBM Control Desk 7.6.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 219124.
[ "cpe:2.3:a:ibm:control_desk:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
4.3
null
null
GHSA-4gp7-wgqw-q868
SQL injection vulnerability in the is_god function in includes/nukesentinel.php in NukeSentinel 2.5.11 allows remote attackers to execute arbitrary SQL commands via base64-encoded data in an admin cookie, a different vector than CVE-2007-5125.
[]
null
null
null
null
null
GHSA-qx3w-cg62-mx4g
Unrestricted file upload vulnerability in admin/galeria.php in ThePortal2 2.2 allows remote attackers to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in galeria/.
[]
null
null
null
null
null
CVE-2024-44146
A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15. An app may be able to break out of its sandbox.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
10
null
null
null
GHSA-62rc-79c5-9jv7
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
[]
null
null
null
null
null
GHSA-x5f4-7cp5-vmcf
IBM ClearQuest (CQ) 9.1 through 9.1.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286833.
[]
null
6.4
null
null
null
RHSA-2017:2931
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net: Out of bounds stack read in memcpy_fromiovec kernel: Out-of-bounds heap access in xfrm kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx() kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack kernel: Use-after-free in sys_mq_notify() kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7
null
null
GHSA-w5cc-jw53-c2fj
A vulnerability has been found in SourceCodester Simple Task Allocation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224743.
[]
null
9.8
null
null
null
RHSA-2020:1138
Red Hat Security Advisory: gettext security and bug fix update
gettext: double free in default_add_message in read-catalog.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4
null
null
GHSA-44vx-q8jj-wcwm
Cross-site scripting (XSS) vulnerability in Vanilla Forums before 2.0.17.6 allows remote attackers to inject arbitrary web script or HTML via the p parameter to an unspecified component, a different vulnerability than CVE-2011-0526.
[]
null
null
null
null
null
GHSA-84xc-hmvp-jp6q
Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function fromSetRouteStatic.
[]
null
7.5
null
null
null
CVE-2014-7216
Multiple stack-based buffer overflows in Yahoo! Messenger 11.5.0.228 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) shortcut or (2) title keys in an emoticons.xml file.
[ "cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2018-17662
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the beep method of a Host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6514.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2019-5311
An issue was discovered in YUNUCMS V1.1.8. app/index/controller/Show.php has an XSS vulnerability via the index.php/index/show/index cw parameter.
[ "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2019-20832
An issue was discovered in Foxit PhantomPDF before 8.3.10. It has homograph mishandling.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
GHSA-p76w-qwr6-94rm
In JetBrains TeamCity before 2021.2.3, environment variables of the "password" type could be logged in some cases.
[]
null
7.5
null
null
null
CVE-2024-57386
Cross Site Scripting vulnerability in Wallos v.2.41.0 allows a remote attacker to execute arbitrary code via the profile picture function.
[]
null
6.1
null
null
null
GHSA-vhfp-9wvj-gwvg
XML External Entity vulnerability in MODX CMS
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
[]
null
9.1
null
null
null
CVE-2007-1005
Heap-based buffer overflow in SW3eng.exe in the eID Engine service in CA (formerly Computer Associates) eTrust Intrusion Detection 3.0.5.57 and earlier allows remote attackers to cause a denial of service (application crash) via a long key length value to the remote administration port (9191/tcp).
[ "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-w2xx-p535-mqhm
In readArgumentList of zygote.java in Android 10, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
null
null
null
null
CVE-2025-3737
Google Maps: Store Locator - Critical - Unsupported - SA-CONTRIB-2025-038
Vulnerability in Drupal Google Maps: Store Locator.This issue affects Google Maps: Store Locator: *.*.
[]
null
5.9
null
null
null
RHSA-2018:2571
Red Hat Security Advisory: bind security update
bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
null
CVE-2024-30570
An information leak in debuginfo.htm of Netgear R6850 v1.1.0.88 allows attackers to obtain sensitive information without any authentication required.
[ "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-h6hm-v4gg-9cgp
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.
[]
null
9.1
null
null
null
RHSA-2017:0250
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
7
null
null
CVE-2020-14489
OpenClinic GA
OpenClinic GA 5.09.02 and 5.89.05b stores passwords using inadequate hashing complexity, which may allow an attacker to recover passwords using known password cracking techniques.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*", "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*" ]
null
6.2
null
null
null
CVE-2021-2253
Vulnerability in the Oracle Advanced Supply Chain Planning product of Oracle Supply Chain (component: Core). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Supply Chain Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Supply Chain Planning accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Supply Chain Planning accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
GHSA-f8rj-4v7g-p5rj
Directory Traversal in jansenstuffpleasework
Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
null
null
7.5
null
null
GHSA-vhhg-73hp-mrc2
Microsoft Edge (Chromium-based) Spoofing Vulnerability
[]
null
4.3
null
null
null
RHSA-2011:1160
Red Hat Security Advisory: dhcp security update
dhcp: denial of service flaws dhcp: denial of service flaws
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
null
CVE-2009-0080
The ThreadPool class in Windows Vista Gold and SP1, and Server 2008, does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by leveraging incorrect thread ACLs to access the resources of one of the processes, aka "Windows Thread Pool ACL Weakness Vulnerability."
[ "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*" ]
null
null
null
6.9
null
GHSA-23wv-w3v2-hcrj
Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGurukul Hospital Management System 4.0 via the docname parameter in /admin/add-doctor.php and /admin/edit-doctor.php
[]
null
5.9
null
null
null
GHSA-vwv2-9wcj-64vx
Firefly III allows webhooks HTML Injection.
Firefly III (aka firefly-iii) before 6.1.1 allows webhooks HTML Injection.
[]
null
6.5
null
null
null
GHSA-4rq4-8r9h-8884
NLnet Labs Krill supports direct access to the RRDP repository content through its built-in web server at the "/rrdp" endpoint. Prior to 0.12.1 a direct query for any existing directory under "/rrdp/", rather than an RRDP file such as "/rrdp/notification.xml" as would be expected, causes Krill to crash. If the built-in "/rrdp" endpoint is exposed directly to the internet, then malicious remote parties can cause the publication server to crash. The repository content is not affected by this, but the availability of the server and repository can cause issues if this attack is persistent and is not mitigated.
[]
null
7.5
null
null
null
CVE-2022-36350
Stored cross-site scripting vulnerability in PukiWiki versions 1.3.1 to 1.5.3 allows a remote attacker to inject an arbitrary script via unspecified vectors.
[ "cpe:2.3:a:pukiwiki:pukiwiki:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-7g7g-82fp-hpxx
CSRF vulnerability in Jenkins SCP publisher Plugin
SCP publisher Plugin 1.8 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[]
null
8.8
null
null
null
GHSA-39fp-mw43-8h5q
mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
[]
null
null
null
null
null
CVE-2025-24215
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information.
[]
null
5.5
null
null
null
CVE-2025-48487
FreeScout Vulnerable to Stored XSS
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when creating a translation of a phrase that appears in a flash-message after a completed action, it is possible to inject a payload to exploit XSS vulnerability. This issue has been patched in version 1.8.180.
[]
6
null
null
null
null
RHSA-2018:3644
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary code execution vulnerability (APSB18-44)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
null
CVE-2022-45176
An issue was discovered in LIVEBOX Collaboration vDesk through v018. Stored Cross-site Scripting (XSS) can occur under the /api/v1/getbodyfile endpoint via the uri parameter. The web application (through its vShare functionality section) doesn't properly check parameters, sent in HTTP requests as input, before saving them on the server. In addition, crafted JavaScript content can then be reflected back to the end user and executed by the web browser.
[ "cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-84qg-hv4f-j8w8
Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.
[]
null
null
null
null
null
CVE-2022-28109
Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.
[ "cpe:2.3:a:selenium:selenium_grid:*:*:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha6:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2025-41686
Improper File Permissions Allow Local Privilege Escalation
A low-privileged local attacker can exploit improper permissions on nssm.exe to escalate their privileges and gain administrative access.
[]
null
7.8
null
null
null
CVE-2014-6692
The Kingsoft Clip (Office Tool) (aka cn.wps.clip) application 1.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:wps:kingsoft_clip_\\(office_tool\\):1.5.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-68wj-ffg5-qg8c
** DISPUTED ** A Missing Authentication for Critical Function issue affecting the HTTP service running on the DJI Mavic Mini 3 Pro on the standard port 80 could allow an attacker to enumerate and download videos and pictures saved on the drone internal or external memory without requiring any kind of authentication.
[]
null
5.2
null
null
null
CVE-2008-4432
Cross-site scripting (XSS) vulnerability in search.php in the RMSOFT MiniShop module 1.0 for Xoops allows remote attackers to inject arbitrary web script or HTML via the itemsxpag parameter.
[ "cpe:2.3:a:rmsoft:minishop_module:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-gr26-qx48-q4hh
In the Linux kernel, the following vulnerability has been resolved:RDMA/core: Fix ib block iterator counter overflowWhen registering a new DMA MR after selecting the best aligned page size for it, we iterate over the given sglist to split each entry to smaller, aligned to the selected page size, DMA blocks.In given circumstances where the sg entry and page size fit certain sizes and the sg entry is not aligned to the selected page size, the total size of the aligned pages we need to cover the sg entry is >= 4GB. Under this circumstances, while iterating page aligned blocks, the counter responsible for counting how much we advanced from the start of the sg entry is overflowed because its type is u32 and we pass 4GB in size. This can lead to an infinite loop inside the iterator function because the overflow prevents the counter to be larger than the size of the sg entry.Fix the presented problem by changing the advancement condition to eliminate overflow.Backtrace: [ 192.374329] efa_reg_user_mr_dmabuf [ 192.376783] efa_register_mr [ 192.382579] pgsz_bitmap 0xfffff000 rounddown 0x80000000 [ 192.386423] pg_sz [0x80000000] umem_length[0xc0000000] [ 192.392657] start 0x0 length 0xc0000000 params.page_shift 31 params.page_num 3 [ 192.399559] hp_cnt[3], pages_in_hp[524288] [ 192.403690] umem->sgt_append.sgt.nents[1] [ 192.407905] number entries: [1], pg_bit: [31] [ 192.411397] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8] [ 192.415601] biter->__sg_advance [665837568] sg_dma_len[3221225472] [ 192.419823] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8] [ 192.423976] biter->__sg_advance [2813321216] sg_dma_len[3221225472] [ 192.428243] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8] [ 192.432397] biter->__sg_advance [665837568] sg_dma_len[3221225472]
[]
null
5.5
null
null
null
GHSA-cwpj-jqfc-p782
Buffer Overflow vulnerability in function C_IStream::read in PluginEXR.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.
[]
null
7.8
null
null
null
CVE-2020-2778
Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
null
3.7
null
null
CVE-2021-20998
WAGO: Managed Switches: Unauthorized creation of user accounts
In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.
[ "cpe:2.3:o:wago:0852-0303_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:0852-0303:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:0852-1305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:0852-1305:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:0852-1505_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:0852-1505:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:0852-1305\\/000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:0852-1305\\/000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:0852-1505\\/000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:0852-1505\\/000-001:-:*:*:*:*:*:*:*" ]
null
10
null
null
null
CVE-2007-4069
SQL injection vulnerability in show_cat.php in IndexScript 2.8 and earlier allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
[ "cpe:2.3:a:index_script:index_script:2.8:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-26364
x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.7
null
7.2
null
CVE-2014-0338
Multiple cross-site scripting (XSS) vulnerabilities in the firewall policy management pages in WatchGuard Fireware XTM before 11.8.3 allow remote attackers to inject arbitrary web script or HTML via the pol_name parameter.
[ "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.6:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.7:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:watchguard:fireware:11.8:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-9gh2-p9fc-q3cr
In the Linux kernel, the following vulnerability has been resolved:rxrpc: Fix delayed ACKs to not set the reference serial numberFix the construction of delayed ACKs to not set the reference serial number as they can't be used as an RTT reference.
[]
null
5.5
null
null
null
CVE-2023-32493
Dell PowerScale OneFS, 9.5.0.x, contains a protection mechanism bypass vulnerability. An unprivileged, remote attacker could potentially exploit this vulnerability, leading to denial of service, information disclosure and remote execution.
[ "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
CVE-2023-29584
mp4v2 v2.0.0 was discovered to contain a heap buffer overflow via the MP4GetVideoProfileLevel function at /src/mp4.cpp.
[ "cpe:2.3:a:mp4v2_project:mp4v2:2.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-42953
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the PPW parameter in the fromWizardHandle function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[ "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:tendacn:fh1201_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*", "cpe:2.3:h:tendacn:fh1201:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-5q3q-hvr5-mvrw
Race condition in pigz before 2.2.5 uses permissions derived from the umask when compressing a file before setting that file's permissions to match those of the original file, which might allow local users to bypass intended access permissions while compression is occurring.
[]
null
null
null
null
null
CVE-2006-6529
The Chatroom Module before 4.7.x.-1.0 for Drupal displays private messages in a chatroom's last messages overview, which allows remote attackers to obtain sensitive information by reading the overview.
[ "cpe:2.3:a:drupal:chatroom_module:4.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2015-2754
FreeXL before 1.0.0i allows remote attackers to cause a denial of service (stack corruption) and possibly execute arbitrary code via a crafted workbook, related to a "premature EOF."
[ "cpe:2.3:a:gaia-gis:freexl:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-q7rj-wq2w-3q9j
x2gocleansessions in X2Go Server before 4.0.0.8 and 4.0.1.x before 4.0.1.10 allows remote authenticated users to gain privileges via unspecified vectors, possibly related to backticks.
[]
null
null
null
null
null
GHSA-qcqm-fvf4-grpc
A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".
[]
2.3
5
null
null
null
CVE-2023-25519
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges. 
[ "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-66j8-27jm-c7ff
Windows Server Key Distribution Service Security Feature Bypass
[]
null
6.1
null
null
null
CVE-2017-2610
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
CVE-2018-0353
A vulnerability in traffic-monitoring functions in Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) functionality and bypass security protections. The vulnerability is due to a change in the underlying operating system software that is responsible for monitoring affected traffic. An attacker could exploit this vulnerability by sending crafted IP packets to an affected device. A successful exploit could allow the attacker to pass traffic through the device, which the WSA was configured to deny. This vulnerability affects both IPv4 and IPv6 traffic. This vulnerability affects Cisco AsyncOS versions for WSA on both virtual and hardware appliances running any release of the 10.5.1, 10.5.2, or 11.0.0 WSA Software. The WSA is vulnerable if it is configured for L4TM. Cisco Bug IDs: CSCvg78875.
[ "cpe:2.3:a:cisco:web_security_appliance:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:10.5.1-296:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:11.5.0-fcs-442:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
PYSEC-2024-143
null
PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system.
[]
null
9.8
null
null
null
GHSA-c73q-cj2f-pr35
In BlackCat CMS 1.2, remote authenticated users can upload any file via the media upload function in backend/media/ajax_upload.php, as demonstrated by a ZIP archive that contains a .php file.
[]
null
null
6.5
null
null
CVE-2024-6598
Denial-of-service on KNIME Business Hub when certain jobs are executed
A denial-of-service attack is possible through the execution functionality of KNIME Business Hub 1.10.0 and 1.10.1. It allows an authenticated attacker with job execution privileges to execute a job that causes internal messages to pile up until there are no more resources available for processing new messages. This leads to an outage of most functionality of KNIME Business Hub. Recovery from the situation is only possible by manual administrator interaction. Please contact our support for instructions in case you have run into this situation. Updating to KNIME Business Hub 1.10.2 or later solves the problem.
[]
7.1
null
null
null
null
GHSA-pp72-j4xc-h27c
OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.
[]
null
null
null
null
null
GHSA-j2m5-w7qp-hqg7
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
[]
null
7.5
null
null
null
CVE-2023-40725
A vulnerability has been identified in QMS Automotive (All versions < V12.39). The affected application returns inconsistent error messages in response to invalid user credentials during login session. This allows an attacker to enumerate usernames, and identify valid usernames.
[ "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*" ]
null
4
null
null
null
GHSA-g245-9vvv-25rm
The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
[]
null
6.1
null
null
null
GHSA-c6m3-55h6-cpq4
The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.
[]
null
null
7.8
null
null
CVE-2011-3324
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
[ "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.17:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-99gx-px59-2hww
EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization for subgroups of privileged groups, which allows remote authenticated sysadmins to gain super-user privileges, and bypass intended restrictions on data access and server actions, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4622.
[]
null
null
null
null
null
GHSA-rg7v-v5mq-rpj8
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V10, V11, V12 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V13 (All versions < V13 SP2 Update 2), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 6), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V15 (All versions < V15 Update 2). Improper file permissions in the default installation of TIA Portal may allow an attacker with local file system access to insert specially crafted files which may prevent TIA Portal startup (Denial-of-Service) or lead to local code execution. No special privileges are required, but the victim needs to attempt to start TIA Portal after the manipulation.
[]
null
null
7.8
null
null
CVE-2016-7136
z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request.
[ "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:a1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1a1:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-7p7c-pvvx-2vx3
hyper-staticfile's improper validation of Windows paths could lead to directory traversal attack
Path resolution in `hyper-staticfile` didn't correctly validate Windows paths, meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem.This only impacts Windows. Linux and other unix likes are not impacted by this.
[]
null
null
null
null
null
GHSA-rc6c-3j97-8gfm
SimplePHPscripts News Script PHP Pro 2.3 does not properly set the HttpOnly Flag from Session Cookies.
[]
null
null
null
null
null
CVE-2018-13990
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.
[ "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*" ]
null
null
8.6
null
null
GHSA-prm9-8h85-6m44
Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
[]
null
4.3
null
null
null
GHSA-589w-p7g5-j9f7
In display, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07671046; Issue ID: ALPS07671046.
[]
null
6.4
null
null
null
GHSA-cqhr-j9fp-qjmw
The Shantz WordPress QOTD WordPress plugin through 1.2.2 is lacking any CSRF check when updating its settings, allowing attackers to make logged in administrators change them to arbitrary values.
[]
null
null
null
null
null
GHSA-w2fh-2f5m-c69g
In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user.
[]
null
null
4.3
null
null
GHSA-gxq7-4c87-6p6j
In numerous hand-crafted functions in libmpeg2, NEON registers are not preserved. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120644655.
[]
null
null
8.8
null
null
GHSA-pmm3-gvq5-3cw3
iNovo Broadband IB-8120-W21 139.4410mp1.004200.002 and IB-8120-W21E1 139.4410mp1.3921132mp1.899.004404.004 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
[]
null
null
9.8
null
null
CVE-2024-40958
netns: Make get_net_ns() handle zero refcount net
In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free. WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0 Modules linked in: CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP: 0010:refcount_warn_saturate+0xdf/0x1d0 Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1 RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001 RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139 R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4 R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040 FS: 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? show_regs+0xa3/0xc0 ? __warn+0xa5/0x1c0 ? refcount_warn_saturate+0xdf/0x1d0 ? report_bug+0x1fc/0x2d0 ? refcount_warn_saturate+0xdf/0x1d0 ? handle_bug+0xa1/0x110 ? exc_invalid_op+0x3c/0xb0 ? asm_exc_invalid_op+0x1f/0x30 ? __warn_printk+0xcc/0x140 ? __warn_printk+0xd5/0x140 ? refcount_warn_saturate+0xdf/0x1d0 get_net_ns+0xa4/0xc0 ? __pfx_get_net_ns+0x10/0x10 open_related_ns+0x5a/0x130 __tun_chr_ioctl+0x1616/0x2370 ? __sanitizer_cov_trace_switch+0x58/0xa0 ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30 ? __pfx_tun_chr_ioctl+0x10/0x10 tun_chr_ioctl+0x2f/0x40 __x64_sys_ioctl+0x11b/0x160 x64_sys_call+0x1211/0x20d0 do_syscall_64+0x9e/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f5b28f165d7 Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8 RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7 RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0 R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730 R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000 </TASK> Kernel panic - not syncing: kernel: panic_on_warn set ... This is trigger as below: ns0 ns1 tun_set_iff() //dev is tun0 tun->dev = dev //ip link set tun0 netns ns1 put_net() //ref is 0 __tun_chr_ioctl() //TUNGETDEVNETNS net = dev_net(tun->dev); open_related_ns(&net->ns, get_net_ns); //ns1 get_net_ns() get_net() //addition on 0 Use maybe_get_net() in get_net_ns in case net's ref is zero to fix this
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2010-1287
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
[ "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-r9wv-87cr-24pw
Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.
[]
null
8.8
null
null
null
CVE-2017-16098
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
[ "cpe:2.3:a:charset_project:charset:*:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
null
CVE-2025-53337
WordPress LifePress Plugin <= 2.1.3 - Broken Access Control Vulnerability
Missing Authorization vulnerability in Ashan Perera LifePress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LifePress: from n/a through 2.1.3.
[]
null
5.4
null
null
null
CVE-2024-56621
scsi: ufs: core: Cancel RTC work during ufshcd_remove()
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Cancel RTC work during ufshcd_remove() Currently, RTC work is only cancelled during __ufshcd_wl_suspend(). When ufshcd is removed in ufshcd_remove(), RTC work is not cancelled. Due to this, any further trigger of the RTC work after ufshcd_remove() would result in a NULL pointer dereference as below: Unable to handle kernel NULL pointer dereference at virtual address 00000000000002a4 Workqueue: events ufshcd_rtc_work Call trace: _raw_spin_lock_irqsave+0x34/0x8c pm_runtime_get_if_active+0x24/0xb4 ufshcd_rtc_work+0x124/0x19c process_scheduled_works+0x18c/0x2d8 worker_thread+0x144/0x280 kthread+0x11c/0x128 ret_from_fork+0x10/0x20 Since RTC work accesses the ufshcd internal structures, it should be cancelled when ufshcd is removed. So do that in ufshcd_remove(), as per the order in ufshcd_init().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2009-1056
IBM Rational AppScan Enterprise before 5.5 FP1 allows remote attackers to read arbitrary exported reports by "forcefully browsing."
[ "cpe:2.3:a:ibm:rational_appscan:*:*:enterprise:*:*:*:*:*" ]
null
null
null
5
null
GHSA-3c8f-rxxg-jrxm
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.
[]
null
4.9
null
null
null
CVE-2016-9820
libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
[ "cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-2phc-7cq6-m4fq
The Inetc plugin for Nullsoft Scriptable Install System (NSIS), as used in CERT/CC Failure Observation Engine (FOE) and other products, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and possibly execute arbitrary code by sending a crafted certificate in a download session for Windows executable files.
[]
null
null
null
null
null
CVE-2008-2325
QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicklook:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-fp8m-q3h7-6ww8
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
[]
null
4.2
null
null
null