id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2020-25624
|
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
|
[
"cpe:2.3:a:qemu:qemu:5.0.0:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5
| null | 4.4
| null |
|
GHSA-4rvv-q3vw-9wwv
|
A maliciously crafted PSD file, when linked or imported into Autodesk 3ds Max, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
|
[] | null | 5.3
| null | null | null |
|
CVE-2017-1000254
|
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
|
[
"cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
GHSA-63xq-rqrc-r5wf
|
LVRTC eParakstitajs 3.0 (1.3.0) and edoc-libraries-2.5.4_01 allow attackers to read arbitrary files via crafted EDOC files.
|
[] | null | null | 5.5
| null | null |
|
GHSA-857q-p34f-mcc7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Tourfic allows Stored XSS.This issue affects Tourfic: from n/a through 2.11.8.
|
[] | null | 6.5
| null | null | null |
|
GHSA-cxw5-vw86-jmmw
|
Unspecified vulnerability in the NFSv4 module in the kernel in Sun Solaris 10, and OpenSolaris snv_102 through snv_119, allows local users to cause a denial of service (client panic) via vectors involving "file operations."
|
[] | null | null | null | null | null |
|
RHSA-2023:7258
|
Red Hat Security Advisory: dotnet6.0 security update
|
dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5
| null | null | null |
CVE-2024-21278
|
Vulnerability in the Oracle Contract Lifecycle Management for Public Sector product of Oracle E-Business Suite (component: Award Processes). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Contract Lifecycle Management for Public Sector. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Contract Lifecycle Management for Public Sector accessible data as well as unauthorized access to critical data or complete access to all Oracle Contract Lifecycle Management for Public Sector accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:contract_lifecycle_management_for_public_sector:12.2.3-12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
CVE-2024-1603
|
confirmed
|
paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.
|
[
"cpe:2.3:a:paddlepaddle:paddle:2.6.0:*:*:*:*:*:*:*"
] | null | null | 8.2
| null | null |
CVE-2025-8904
|
Privilege escalation issue in Amazon EMR Secret Agent component
|
Amazon EMR Secret Agent creates a keytab file containing Kerberos credentials. This file is stored in the /tmp/ directory. A user with access to this directory and another account can potentially decrypt the keys and escalate to higher privileges.
Users are advised to upgrade to Amazon EMR version 7.5 or higher. For Amazon EMR releases between 6.10 and 7.4, we strongly recommend that you run the bootstrap script and RPM files with the fix provided in the location below.
|
[] | 9
| 8.5
| null | null | null |
CVE-2010-5017
|
SQL injection vulnerability in stats.php in Elite Gaming Ladders 3.0 allows remote attackers to execute arbitrary SQL commands via the account parameter.
|
[
"cpe:2.3:a:eliteladders:elite_gaming_ladders:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2021-41227
|
Arbitrary memory read in `ImmutableConst`
|
TensorFlow is an open source platform for machine learning. In affected versions the `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents. This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*"
] | null | 6.6
| null | null | null |
CVE-2013-1619
|
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
|
[
"cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:2.12.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*"
] | null | null | null | 4
| null |
|
GHSA-vr7f-qwxp-xqrp
|
In the Linux kernel, the following vulnerability has been resolved:riscv:uprobe fix SR_SPIE set/clear handlingIn riscv the process of uprobe going to clear spie before exec
the origin insn,and set spie after that.But When access the page
which origin insn has been placed a page fault may happen and
irq was disabled in arch_uprobe_pre_xol function,It cause a WARN
as follows.
There is no need to clear/set spie in arch_uprobe_pre/post/abort_xol.
We can just remove it.[ 31.684157] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1488
[ 31.684677] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 76, name: work
[ 31.684929] preempt_count: 0, expected: 0
[ 31.685969] CPU: 2 PID: 76 Comm: work Tainted: G
[ 31.686542] Hardware name: riscv-virtio,qemu (DT)
[ 31.686797] Call Trace:
[ 31.687053] [<ffffffff80006442>] dump_backtrace+0x30/0x38
[ 31.687699] [<ffffffff80812118>] show_stack+0x40/0x4c
[ 31.688141] [<ffffffff8081817a>] dump_stack_lvl+0x44/0x5c
[ 31.688396] [<ffffffff808181aa>] dump_stack+0x18/0x20
[ 31.688653] [<ffffffff8003e454>] __might_resched+0x114/0x122
[ 31.688948] [<ffffffff8003e4b2>] __might_sleep+0x50/0x7a
[ 31.689435] [<ffffffff80822676>] down_read+0x30/0x130
[ 31.689728] [<ffffffff8000b650>] do_page_fault+0x166/x446
[ 31.689997] [<ffffffff80003c0c>] ret_from_exception+0x0/0xc
|
[] | null | null | null | null | null |
|
GHSA-667j-rh34-gp4p
|
Laundry Booking Script 1.0 has SQL Injection via the /list city parameter.
|
[] | null | null | 9.8
| null | null |
|
CVE-2010-3443
|
ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message.
|
[
"cpe:2.3:a:quassel-irc:quassel_irc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quassel-irc:quassel_irc:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-f5wh-76c3-v562
|
Authentication Bypass by Spoofing vulnerability in WPMU DEV Branda allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Branda: from n/a through 3.4.14.
|
[] | null | 5.3
| null | null | null |
|
GHSA-r99v-5qp5-2g28
|
Monstra CMS 3.0.4 allows attackers to execute arbitrary code via a crafted payload entered into the "Snippet content" field under the "Edit Snippet" module.
|
[] | null | 8.8
| null | null | null |
|
CVE-2021-39866
|
A business logic error in the project deletion process in GitLab 13.6 and later allows persistent access via project access tokens.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:4.3.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:4.3.0:*:*:*:enterprise:*:*:*"
] | null | 5.4
| null | null | null |
|
CVE-2025-9845
|
code-projects Fruit Shop Management System products.php cross site scripting
|
A vulnerability has been found in code-projects Fruit Shop Management System 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. Such manipulation of the argument product_code/gen_name/product_name/supplier leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1
| 3.5
| 3.5
| 4
| null |
GHSA-8j28-3ggh-xffw
|
Dino before 0.1.2 and 0.2.x before 0.2.1 allows Directory Traversal (only for creation of new files) via URI-encoded path separators.
|
[] | null | null | null | null | null |
|
GHSA-rhfv-688c-p6hp
|
XWiki Platform Security Authorization Bridge allows users with just edit right can enforce required rights with programming right
|
ImpactIn XWiki 16.10.0, required rights were introduced as a way to limit which rights a document can have. Part of the security model of required rights is that a user who doesn't have a right also cannot define that right as required right. That way, users who are editing documents on which required rights are enforced can be sure that they're not giving a right to a script or object that it didn't have before. A bug in the implementation of the enforcement of this rule means that in fact, it was possible for any user with edit right on a document to set programming right as required right. If then a user with programming right edited that document, the content of that document would gain programming right, allowing remote code execution. This thereby defeats most of the security benefits of required rights. As XWiki still performs the required rights analysis when a user edits a page even when required rights are enforced, the user with programming right would still be warned about the dangerous content unless the attacker managed to bypass this check (see, e.g., https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c32m-27pj-4xcj). Note also that none of the affected versions include a UI for enabling the enforcing of required rights so it seems unlikely that anybody relied on them for security in the affected versions. As this vulnerability provides no additional attack surface unless all documents in the wiki enforce required rights, we consider the impact of this attack to be low even though gaining programming right could have a high impact.PatchesThis vulnerability has been patched in XWiki 16.10.4 and 17.1.0RC1.WorkaroundsWe're not aware of any workarounds except for upgrading.
|
[] | 4.8
| null | null | null | null |
GHSA-3pmw-4742-vqgf
|
The WP Security Question plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 8.8
| null | null | null |
|
CVE-2019-14514
|
An issue was discovered in Microvirt MEmu all versions prior to 7.0.2. A guest Android operating system inside the MEmu emulator contains a /system/bin/systemd binary that is run with root privileges on startup (this is unrelated to Red Hat's systemd init program, and is a closed-source proprietary tool that seems to be developed by Microvirt). This program opens TCP port 21509, presumably to receive installation-related commands from the host OS. Because everything after the installer:uninstall command is concatenated directly into a system() call, it is possible to execute arbitrary commands by supplying shell metacharacters.
|
[
"cpe:2.3:a:microvirt:memu:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
CVE-2025-23346
|
NVIDIA CUDA Toolkit contains a vulnerability in cuobjdump, where an unprivileged user can cause a NULL pointer dereference. A successful exploit of this vulnerability may lead to a limited denial of service.
|
[] | null | 3.3
| null | null | null |
|
GHSA-6346-27p9-5355
|
Accellion FTA 9_12_432 and earlier is affected by argument injection via a crafted POST request to an admin endpoint. The fixed version is FTA_9_12_444 and later.
|
[] | null | null | null | null | null |
|
GHSA-33vr-wwjf-63w6
|
An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database.
|
[] | null | 7.5
| null | null | null |
|
CVE-2024-8684
|
OS Command Injection vulnerability in Revolution Pi
|
OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter.
|
[] | null | 8.3
| null | null | null |
CVE-2008-5987
|
Untrusted search path vulnerability in the Python interface in Eye of GNOME (eog) 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
|
[
"cpe:2.3:a:gnome:eog:2.22.3:*:*:*:*:*:*:*"
] | null | null | null | 6.9
| null |
|
CVE-2021-31616
|
Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.1.0 allow a stack buffer overflow via crafted messages. The overflow in ethereum_extractThorchainSwapData() in ethereum.c can circumvent stack protections and lead to code execution. The vulnerable interface is reachable remotely over WebUSB.
|
[
"cpe:2.3:o:shapeshift:keepkey_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:shapeshift:keepkey:-:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
GHSA-ffv4-58cg-f6v5
|
IBM Tivoli Storage Productivity Center (IBM Spectrum Control Standard Edition 5.2.1 through 5.2.17) allows users to remain idle within the application even when a user has logged out. Utilizing the application back button users can remain logged in as the current user for a short period of time, therefore users are presented with information for Spectrum Control Application. IBM X-Force ID: 157064.
|
[] | null | 6.3
| null | null | null |
|
CVE-2019-20675
|
Certain NETGEAR devices are affected by stored XSS. This affects RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
|
[
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*"
] | null | null | 6
| null | null |
|
GHSA-pmv2-x9cp-qmxj
|
Unspecified vulnerability in HP StoreVirtual 4000 Storage and StoreVirtual VSA 9.5 through 11.0 allows remote attackers to obtain sensitive information via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-26889
|
Bluetooth: hci_core: Fix possible buffer overflow
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Fix possible buffer overflow
struct hci_dev_info has a fixed size name[8] field so in the event that
hdev->name is bigger than that strcpy would attempt to write past its
size, so this fixes this problem by switching to use strscpy.
|
[] | null | 5.5
| null | null | null |
GHSA-mqww-8m23-jp5w
|
In Permission Manager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5
| null | null | null |
|
GHSA-h63m-522m-f339
|
OwnTone (aka owntone-server) through 28.1 has a use-after-free in net_bind() in misc.c.
|
[] | null | null | null | null | null |
|
CVE-2014-3014
|
Cross-site scripting (XSS) vulnerability in the Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:sametime:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5
| null |
|
GHSA-q23q-8cgx-c4v7
|
GGLocker iOS application, contains an insecure data storage of the password hash value which results in an authentication bypass.
|
[] | null | null | null | null | null |
|
CVE-2014-9699
|
The MakerBot Replicator 5G printer runs an Apache HTTP Server with directory indexing enabled. Apache logs, system logs, design files (i.e., a history of print files), and more are exposed to unauthenticated attackers through this HTTP server.
|
[
"cpe:2.3:o:makerbot:replicator_5th_generation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:makerbot:replicator_5th_generation:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2015-5317
|
The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-vr9m-pp3c-c964
|
Multiple cross-site scripting (XSS) vulnerabilities in Openfiler 2.99 allow remote attackers to inject arbitrary web script or HTML via the (1) TinkerAjax parameter to uptime.html, or remote authenticated users to inject arbitrary web script or HTML via the (2) MaxInstances, (3) PassivePorts, (4) Port, (5) ServerName, (6) TimeoutLogin, (7) TimeoutNoTransfer, or (8) TimeoutStalled parameter to admin/services_ftp.html; the (9) dns1 or (10) dns2 parameter to admin/system.html; the (11) newTgtName parameter to admin/volumes_iscsi_targets.html; the User-Agent HTTP header to (12) language.html, (13) login.html, or (14) password.html in account/; or the User-Agent HTTP header to (15) account_groups.html, (16) account_users.html, (17) services.html, (18) services_ftp.html, (19) services_iscsi_target.html, (20) services_rsync.html, (21) system_clock.html, (22) system_info.html, (23) system_ups.html, (24) volumes_editpartitions.html, or (25) volumes_iscsi_targets.html in admin/.
|
[] | null | null | null | null | null |
|
GHSA-5xm9-xmq7-g226
|
Integer overflow in base/PdfParser.cpp in PoDoFo 0.9.4 allows remote attackers to have unspecified impact via a crafted file.
|
[] | null | null | 7.8
| null | null |
|
CVE-2018-9006
|
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win7_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c402004.
|
[
"cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.1
| null |
|
GHSA-rxr5-9xmw-h4rj
|
SQL injection vulnerability in include/img_view.class.php in LinPHA 1.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the order parameter to new_images.php.
|
[] | null | null | null | null | null |
|
CVE-2020-10988
|
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.
|
[
"cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
CVE-2021-0210
|
Junos OS: Privilege escalation in J-Web due to arbitrary command and code execution via information disclosure from another users active session
|
An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S17; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R2-S4, 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3, 19.2R3-S1; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2.
|
[
"cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*"
] | null | 6.8
| null | null | null |
CVE-2007-2489
|
Heap-based buffer overflow in LiveData Protocol Server 5.00.045, and other versions before update 500062 (5.00.062), allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request for a WSDL file that causes a negative length to be used in a strncpy call.
|
[
"cpe:2.3:a:livedata:protocol_server:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2021-46499
|
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
|
[
"cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*"
] | null | 5.5
| null | 4.3
| null |
|
GHSA-qcq5-ww8j-m4m7
|
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
|
[] | null | 8.8
| null | null | null |
|
CVE-2000-0810
|
Auction Weaver 1.0 through 1.04 does not properly validate the names of form fields, which allows remote attackers to delete arbitrary files and directories via a .. (dot dot) attack.
|
[
"cpe:2.3:a:cgi_script_center:auction_weaver:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_script_center:auction_weaver:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_script_center:auction_weaver:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_script_center:auction_weaver:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_script_center:auction_weaver:1.04:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-rv56-m3gf-cgwm
|
A vulnerability has been found in Tenda CP3 11.10.00.2311090948 and classified as critical. Affected by this vulnerability is the function sub_F3C8C of the file apollo. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2
| 4.7
| null | null | null |
|
GHSA-mc87-7mq4-f2ph
|
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32940193. References: QC-CR#1102593.
|
[] | null | null | 7
| null | null |
|
CVE-2013-3818
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect integrity via unknown vectors related to Portal, a different vulnerability than CVE-2013-2404.
|
[
"cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2023-48256
|
The vulnerability allows a remote attacker to inject arbitrary HTTP response headers or manipulate HTTP response bodies inside a victim’s session via a crafted URL or HTTP request.
|
[
"cpe:2.3:o:bosch:nexo-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v-b_\\(0608842012\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v_\\(0608842011\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v-b_\\(0608842006\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v_\\(0608842001\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v-b_\\(0608842007\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v_\\(0608842002\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v-b_\\(0608842008\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v_\\(0608842003\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v-b_\\(0608842014\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v_\\(0608842013\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v-b_\\(0608842010\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v_\\(0608842005\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v-b_\\(0608842016\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v_\\(0608842015\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2272\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2301\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2514\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2515\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2666\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2673\\):-:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
|
GHSA-529p-f8cv-j372
|
IOAcceleratorFamily in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not properly handle resource lists and IOService userclient types, which allows attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference) via a crafted app.
|
[] | null | null | null | null | null |
|
GHSA-wq23-fxhr-wjq3
|
Lack of secure text entry mode in Browser UI in Google Chrome on Mac prior to 67.0.3396.62 allowed a local attacker to obtain potentially sensitive information from process memory via a local process.
|
[] | null | null | 5.5
| null | null |
|
GHSA-qjp8-pqqf-9p7g
|
Pyplate 0.08 does not set the secure flag for the id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
|
[] | null | null | null | null | null |
|
CVE-2017-14687
|
Artifex MuPDF 1.11 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .xps file, related to "Data from Faulting Address controls Branch Selection starting at mupdf+0x000000000016cb4f" on Windows. This occurs because of mishandling of XML tag name comparisons.
|
[
"cpe:2.3:a:artifex:mupdf:1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
CVE-2021-0372
|
In getMediaOutputSliceAction of RemoteMediaSlice.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174047735
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8
| null | 4.6
| null |
|
CVE-2025-40101
|
btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST
At the end of btrfs_load_block_group_zone_info() the first thing we do
is to ensure that if the mapping type is not a SINGLE one and there is
no RAID stripe tree, then we return early with an error.
Doing that, though, prevents the code from running the last calls from
this function which are about freeing memory allocated during its
run. Hence, in this case, instead of returning early, we set the ret
value and fall through the rest of the cleanup code.
|
[] | null | null | null | null | null |
RHSA-2023:6282
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8
| null | null | null |
GHSA-pgcp-m69h-p2gr
|
Cross-site Scripting (XSS) in moodle
|
In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.
|
[] | null | 6.1
| null | null | null |
CVE-2023-21372
|
In libdexfile, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
CVE-2025-28169
|
BYD QIN PLUS DM-i Dilink OS v3.0_13.1.7.2204050.1 to v3.0_13.1.7.2312290.1_0 was discovered to cend broadcasts to the manufacturer's cloud server unencrypted, allowing attackers to execute a man-in-the-middle attack.
|
[] | null | 8.1
| null | null | null |
|
CVE-2024-29435
|
An issue discovered in Alldata v0.4.6 allows attacker to run arbitrary commands via the processId parameter.
|
[
"cpe:2.3:a:alldata:alldata:*:*:*:*:*:*:*:*"
] | null | 4.1
| null | null | null |
|
CVE-2022-41994
|
Stored cross-site scripting vulnerability in Permission Settings of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script.
|
[
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | 4.8
| null | null | null |
|
RHSA-2024:8358
|
Red Hat Security Advisory: NetworkManager-libreswan security update
|
NetworkManager-libreswan: Local privilege escalation via leftupdown
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8
| null | null | null |
GHSA-xj6g-c6gv-vmjp
|
In the Linux kernel, the following vulnerability has been resolved:netfs: Fix netfs_page_mkwrite() to check folio->mapping is validFix netfs_page_mkwrite() to check that folio->mapping is valid once it has
taken the folio lock (as filemap_page_mkwrite() does). Without this,
generic/247 occasionally oopses with something like the following:This is due to the invalidate_inode_pages2_range() issued at the end of the
DIO write interfering with the mmap'd writes.
|
[] | null | 5.5
| null | null | null |
|
GHSA-4pc4-m9mj-v2r9
|
TensorFlow vulnerable to segfault in `QuantizedBiasAdd`
|
ImpactIf `QuantizedBiasAdd` is given `min_input`, `max_input`, `min_bias`, `max_bias` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.PatchesWe have patched the issue in GitHub commit [785d67a78a1d533759fcd2f5e8d6ef778de849e0](https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0).The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Neophytos Christou, Secure Systems Labs, Brown University.
|
[] | null | 5.9
| null | null | null |
CVE-2020-26550
|
An issue was discovered in Aviatrix Controller before R5.3.1151. An encrypted file containing credentials to unrelated systems is protected by a three-character key.
|
[
"cpe:2.3:a:aviatrix:controller:5.3.1516:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-fc22-4m27-mgxq
|
Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2016-2933
|
Directory traversal vulnerability in IBM BigFix Remote Control before 9.1.3 allows remote authenticated administrators to read arbitrary files via a crafted request.
|
[
"cpe:2.3:a:ibm:bigfix_remote_control:*:*:*:*:*:*:*:*"
] | null | null | 6.8
| 6.8
| null |
|
GHSA-fjhj-x5j3-wcrf
|
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.
|
[] | null | null | null | null | null |
|
CVE-2023-48244
|
The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.
|
[
"cpe:2.3:o:bosch:nexo-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v-b_\\(0608842012\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v_\\(0608842011\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v-b_\\(0608842006\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v_\\(0608842001\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v-b_\\(0608842007\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v_\\(0608842002\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v-b_\\(0608842008\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v_\\(0608842003\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v-b_\\(0608842014\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v_\\(0608842013\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v-b_\\(0608842010\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v_\\(0608842005\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v-b_\\(0608842016\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v_\\(0608842015\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2272\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2301\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2514\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2515\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2666\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2673\\):-:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
|
CVE-2010-2044
|
SQL injection vulnerability in the Konsultasi (com_konsultasi) component 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the sid parameter in a detail action to index.php.
|
[
"cpe:2.3:a:adhie_utomo:com_konsultasi:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2016-10037
|
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist.
|
[
"cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*"
] | null | 7.3
| null | 7.5
| null |
|
CVE-2014-9750
|
ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.
|
[
"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
GHSA-xjrg-6fv9-6rjg
|
Stored XSS vulnerability in Jenkins Build With Parameters Plugin
|
Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.Jenkins Build With Parameters Plugin 1.5.1 escapes parameter names and descriptions.
|
[] | null | 5.4
| null | null | null |
CVE-2014-7860
|
The web/web_file/fb_publish.php script in D-Link DNS-320L before 1.04b12 and DNS-327L before 1.03b04 Build0119 does not authenticate requests, which allows remote attackers to obtain arbitrary photos and publish them to an arbitrary Facebook profile via a target album_id and access_token.
|
[
"cpe:2.3:o:d-link:dns-327l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-320l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*"
] | null | null | 5.3
| 5
| null |
|
CVE-2025-37801
|
spi: spi-imx: Add check for spi_imx_setupxfer()
|
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-imx: Add check for spi_imx_setupxfer()
Add check for the return value of spi_imx_setupxfer().
spi_imx->rx and spi_imx->tx function pointer can be NULL when
spi_imx_setupxfer() return error, and make NULL pointer dereference.
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Call trace:
0x0
spi_imx_pio_transfer+0x50/0xd8
spi_imx_transfer_one+0x18c/0x858
spi_transfer_one_message+0x43c/0x790
__spi_pump_transfer_message+0x238/0x5d4
__spi_sync+0x2b0/0x454
spi_write_then_read+0x11c/0x200
|
[] | null | 5.5
| null | null | null |
RHSA-2019:2756
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerabilities (APSB19-46) flash-plugin: Arbitrary Code Execution vulnerabilities (APSB19-46)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8
| null | null |
GHSA-gcfh-vw6r-jgv8
|
There is a vulnerability in the Supermicro BMC firmware validation logic at Supermicro MBD-X12STW . An attacker can update the system firmware with a specially crafted image.
|
[] | null | 6.6
| null | null | null |
|
CVE-2016-4164
|
Cross-site scripting (XSS) vulnerability in Adobe Brackets before 1.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:adobe:brackets:*:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-v35q-38fv-g69h
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Event Ticketing allows Reflected XSS. This issue affects WP Event Ticketing: from n/a through 1.3.4.
|
[] | null | 7.1
| null | null | null |
|
CVE-2014-10014
|
Multiple cross-site request forgery (CSRF) vulnerabilities in PHPJabbers Event Booking Calendar 2.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change the username and password of the administrator via an update action to the AdminOptions controller or conduct cross-site scripting (XSS) attacks via the (2) event_title parameter in a create action to the AdminEvents controller or (3) category_title parameter in a create action to the AdminCategories controller.
|
[
"cpe:2.3:a:phpjabbers:event_booking_calendar:2.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
GHSA-wpmg-x9fg-4m72
|
pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files.
|
[] | null | null | null | null | null |
|
CVE-2017-11450
|
coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via JPEG data that is too short.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
CVE-2024-4707
|
Materialis Companion <= 1.3.41 - Authenticated (Contributor+) Store Cross-Site Scripting via materialis_contact_form Shortcode
|
The Materialis Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's materialis_contact_form shortcode in all versions up to, and including, 1.3.41 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:extendthemes:materialis_companion:*:*:*:*:*:wordpress:*:*"
] | null | 6.4
| null | null | null |
GHSA-jgfm-rcjw-3pmx
|
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions), SIMATIC STEP 7 (TIA Portal) V15 (All versions), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES (All versions), Soft Starter ES (All versions). Sending a specially crafted packet to the affected service could cause a partial remote Denial-of-Service, that would cause the service to restart itself.
|
[] | null | 5.3
| null | null | null |
|
GHSA-9h56-55p8-xgj2
|
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.4 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-0405.
|
[] | null | null | null | null | null |
|
CVE-2019-6626
|
On BIG-IP (AFM, Analytics, ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, and 11.5.1-11.6.3.4, A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the Configuration utility.
|
[
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-5qwh-g35c-5mmm
|
An issue was discovered in GitLab CE/EE affecting all versions starting from 11.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 where it was possible to upload an NPM package with conflicting package data.
|
[] | null | 3
| null | null | null |
|
GHSA-c6pf-22fc-fhr3
|
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434.
|
[] | null | 6.8
| null | null | null |
|
GHSA-qrg9-7x38-vcrm
|
The default configuration for the Webform CiviCRM Integration module 7.x-3.x before 7.x-3.2 has "Enforce Permissions" disabled, which allows remote attackers to obtain contact information by reading webforms.
|
[] | null | null | null | null | null |
|
CVE-2019-1965
|
Cisco NX-OS Software Remote Management Memory Leak Denial of Service Vulnerability
|
A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.
|
[
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9504-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x96136yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x96136yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_2-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_6-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs-6296up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*"
] | null | null | 7.7
| null | null |
CVE-2023-5347
|
Unauthenticated Firmware Upgrade
|
An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.
|
[
"cpe:2.3:o:korenix:jetnet_5310g_firmware:2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_5310g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508i-w_firmware:1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508i-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508-w_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508if-s_firmware:1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508if-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508if-m_firmware:1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508if-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508if-sw_firmware:1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508if-sw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508if-mw_firmware:1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508if-mw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508f-m_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508f-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508f-s_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508f-mw_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508f-mw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_4508f-sw_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_4508f-sw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_5620g-4c_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_5620g-4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_5612gp-4f_firmware:1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_5612gp-4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_5612g-4f_firmware:1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_5612g-4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-us_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-eu_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6528gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6528gf-2ac-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6528gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6528gf-2ac-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6528gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6528gf-2dc24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6528gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6528gf-2dc48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6528gf-ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6528gf-ac-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6528gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6528gf-ac-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6628xp-4f-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6628x-4f-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-us_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-eu_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-2dc48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-2dc24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-2ac-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-ac-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-2ac-au_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-2ac-au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6828gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6828gf-2ac-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_6910g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_6910g-m12_hvdc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7310g-v2_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_7310g-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7628x-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_7628x-4f-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_7628x-4f-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:korenix:jetnet_7714g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:korenix:jetnet_7714g-m12_hvdc:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
CVE-2022-34368
|
Dell EMC NetWorker 19.2.1.x 19.3.x, 19.4.x, 19.5.x, 19.6.x and 19.7.0.0 contain an Improper Handling of Insufficient Permissions or Privileges vulnerability. Authenticated non admin user could exploit this vulnerability and gain access to restricted resources.
|
[
"cpe:2.3:a:dell:emc_networker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_networker:19.7.0.0:*:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
|
GHSA-j72f-vfwh-m8f9
|
The devtools API in Whale browser before 3.12.129.18 allowed extension developers to inject arbitrary JavaScript into the extension store web page via devtools.inspectedWindow, leading to extensions downloading and uploading when users open the developer tool.
|
[] | null | 6.1
| null | null | null |
|
GHSA-g87h-p2c5-jfxw
|
ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a libcurl integer overflow, which allows remote attackers to cause a denial of service (allocation error and heap-based buffer overflow) or possibly have unspecified other impact via a long string that is mishandled in a curl_escape call.
|
[] | null | null | 9.8
| null | null |
|
GHSA-f782-4m22-g5wv
|
A vulnerability has been identified in Simcenter Femap (All versions < V2022.2). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17293)
|
[] | null | 7.8
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.