id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-724c-p358-mw5j | Multiple cross-site scripting (XSS) vulnerabilities in IBM Curam Social Program Management 4.5 SP10 through 6.0.5.4 allow remote authenticated users to inject arbitrary web script or HTML via crafted input to a (1) custom JSP or (2) custom renderer. | [] |
|
GHSA-wr2h-chhq-3jh8 | wac commit 385e1 was discovered to contain a heap overflow via the setup_call function at /wac-asan/wa.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted wasm file. | [] |
|
GHSA-gxqg-c4hq-9hvc | Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Uploader version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | [] |
|
GHSA-f2gp-v3qf-r49j | Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory. | [] |
|
CVE-2018-7068 | HPE has identified a remote HOST header attack vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version. | [
"cpe:2.3:a:hp:centralview_fraud_risk_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-41560 | OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php. | [
"cpe:2.3:a:opencats:opencats:*:*:*:*:*:*:*:*"
] |
|
GHSA-qpg6-9qg9-qpwr | The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request). | [] |
|
CVE-2022-35583 | wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target's system by injecting iframe tag with initial asset IP address on it's source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets. | [
"cpe:2.3:a:wkhtmltopdf:wkhtmltopdf:0.12.6:*:*:*:*:*:*:*"
] |
|
GHSA-jjfq-rv7x-xc35 | Cross-site scripting (XSS) vulnerability in the Attachment Manager (admincp/attachment.php) in Jelsoft vBulletin 3.6.4 allows remote attackers to inject arbitrary web script or HTML via the Extension field. NOTE: this might be a duplicate of CVE-2007-0830.5. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-5wx7-h3p3-j736 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Webcodin WCP OpenWeather plugin <= 2.5.0 versions. | [] |
|
GHSA-387f-x58r-3vw7 | Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the sysNewPasswd parameter at admin_account.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. | [] |
|
GHSA-2q9m-cq5v-cp3v | SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the "Restart" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user's program and restart it with root privileges. | [] |
|
GHSA-g3r9-j55g-jg8j | __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. | [] |
|
CVE-2014-3533 | dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-2212 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-3770 | A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files. | [
"cpe:2.3:a:markdown-pdf_project:markdown-pdf:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-pmgm-h3cc-m4hj | React Native Document Picker Directory Traversal vulnerability | Directory Traversal vulnerability in React Native Document Picker before 8.2.2 and 9.x before 9.1.1 allows a local attacker to execute arbitrary code via a crafted script to the Android library component. | [] |
GHSA-r527-v52q-x77v | servlet/MIMEReceiveServlet in the web controller for Mitsubishi Electric GB-50 and GB-50A air-conditioning control systems allows remote attackers to cause a denial of service (air-conditioning outage) via an XML document containing a setRequest command. | [] |
|
CVE-2023-33365 | A path traversal vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows unauthenticated attackers to fetch arbitrary files from the server's web server. | [
"cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:*"
] |
|
GHSA-648w-fmj6-586x | Cross-site scripting (XSS) vulnerability in the Forum module in Drupal 6.x before 6.13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2022-33035 | XLPD v7.0.0094 and below contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges. | [
"cpe:2.3:a:netsarang:xlpd:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-23532 | This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.6 and iPadOS 15.7.6. An app may be able to break out of its sandbox. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-7808 | RAONWIZ Inc K Upload, arguments modiffication via missing support for integrity check vulnerability | In RAONWIZ K Upload v2018.0.2.51 and prior, automatic update processing without integrity check on update module(web.js) allows an attacker to modify arguments which causes downloading a random DLL and injection on it. | [
"cpe:2.3:a:raonwiz:raon_k_upload:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*"
] |
CVE-2019-12691 | Cisco Firepower Management Center Directory Traversal Vulnerability | A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass Cisco FMC Software security restrictions and gain access to the underlying filesystem of the affected device. | [
"cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*"
] |
GHSA-cfq9-96fh-ph8f | ZenMate 1.5.4 for macOS suffers from a type confusion vulnerability within the com.zenmate.chron-xpc LaunchDaemon component. The LaunchDaemon implements an XPC service that uses an insecure XPC API for accessing data from an inbound XPC message. This could potentially result in an XPC object of the wrong type being passed as the first argument to the xpc_connection_create_from_endpoint function if controlled by an attacker. In recent versions of macOS and OS X, Apple has implemented an internal check to prevent such XPC API abuse from occurring, thus making this vulnerability only result in a denial of service if exploited by an attacker. | [] |
|
CVE-2020-3335 | Cisco Application Services Engine Software Authorization Vulnerability | A vulnerability in the key store of Cisco Application Services Engine Software could allow an authenticated, local attacker to read sensitive information of other users on an affected device. The vulnerability is due to insufficient authorization limitations. An attacker could exploit this vulnerability by logging in to an affected device locally with valid credentials. A successful exploit could allow the attacker to read the sensitive information of other users on the affected device. | [
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(0c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_services_engine:*:*:*:*:*:*:*:*"
] |
CVE-2021-0968 | In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577 | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-7272 | The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part of the URL, which allows attackers to obtain sensitive information by finding an ID value in a log file. | [
"cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-p797-78m8-4ww4 | An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response. | [] |
|
GHSA-jj2m-7f8j-222w | The Quick Code WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | [] |
|
GHSA-cvg4-hp78-jhgv | A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20. | [] |
|
CVE-2018-0907 | Microsoft Excel 2007 SP3, Microsoft Excel 2010 SP2, Microsoft Excel 2013 SP1, Microsoft Excel 2016, Microsoft Office 2016 Click-to-Run and Microsoft Office 2016 for Mac allow a security feature bypass vulnerability due to how macro settings are enforced, aka "Microsoft Office Excel Security Feature Bypass". | [
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*"
] |
|
CVE-2024-51546 | Credentails Disclosure | Credentials Disclosure vulnerabilities allow access to on board project back-up bundles.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02 | [
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] |
CVE-2010-3702 | The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference. | [
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
] |
|
GHSA-33gg-2298-wmfp | Adobe InDesign version 16.0 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2009-2676 | Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher. | [
"cpe:2.3:a:sun:java_se:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*"
] |
|
CVE-2024-10690 | Shortcodes for Elementor <= 1.0.4 - Authenticated (Contributor+) Post Disclosure | The Shortcodes for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.4 via the 'SHORTCODE_ELEMENTOR' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created with Elementor that they should not have access to. | [] |
GHSA-h697-w4ph-7pcx | Moodle has a stored XSS in ddimageortext question type | The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk. | [] |
CVE-2024-11995 | code-projects Farmacia pagamento.php cross site scripting | A vulnerability has been found in code-projects Farmacia 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /pagamento.php. The manipulation of the argument total leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:farmacia:*:*:*:*:*:*:*:*",
"cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*"
] |
CVE-2024-37423 | WordPress Newspack Blocks plugin <= 3.0.8 - Contributor+ Arbitrary Directory Deletion vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic Newspack Blocks allows Path Traversal.This issue affects Newspack Blocks: from n/a through 3.0.8. | [] |
GHSA-3cmq-696r-cgp7 | SQL injection vulnerability in msg.php in AlstraSoft Video Share Enterprise allows remote authenticated users to execute arbitrary SQL commands via the id parameter. | [] |
|
CVE-2024-49127 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | [] |
GHSA-cqmh-x8qq-7fj3 | The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | [] |
|
GHSA-gv3m-g54h-56c6 | SAP NetWeaver Application Server Java for Classload Service - version 7.50, does not perform any authentication checks for functionalities that require user identity, resulting in escalation of privileges. This failure has a low impact on confidentiality of the data such that an unassigned user can read non-sensitive server data. | [] |
|
CVE-2021-25000 | Booster for WooCommerce < 5.4.9 - Reflected Cross-Site Scripting in General Module | The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_delete_role parameter before outputting back in the admin dashboard when the General module is enabled, leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
GHSA-7mjq-48wm-fwq6 | HP MFP Digital Sending Software 4.9x through 4.91.21 allows local users to obtain sensitive workflow-metadata information via unspecified vectors. | [] |
|
CVE-2021-34757 | Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities | Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:o:cisco:business_220-8t-e-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-8t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-8p-e-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-8p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-8fp-e-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-8fp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-16t-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-16t-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-16p-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-16p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24t-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24p-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24fp-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48t-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48p-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24t-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24p-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24fp-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48t-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48p-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48fp-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48fp-4x:-:*:*:*:*:*:*:*"
] |
GHSA-f93h-pcqv-5rf7 | An access control issue in IceCMS v3.4.7 and before allows attackers to arbitrarily modify users' information, including username and password, via a crafted POST request sent to the endpoint /User/ChangeUser/s in the ChangeUser function in UserController.java | [] |
|
CVE-2017-8630 | Microsoft Office 2016 allows a remote code execution vulnerability when it fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8631, CVE-2017-8632, and CVE-2017-8744. | [
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*"
] |
|
CVE-2009-1001 | Unspecified vulnerability in Oracle BEA WebLogic Portal 8.1 Gold through SP6 allows remote authenticated users to gain privileges via unknown vectors. | [
"cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*"
] |
|
GHSA-62x2-7ppm-gf38 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | [] |
|
CVE-2005-0828 | highlight.php in (1) RUNCMS 1.1A, (2) CIAMOS 0.9.2 RC1, (3) e-Xoops 1.05 Rev3, and possibly other products based on e-Xoops (exoops), allows remote attackers to read arbitrary PHP files by specifying the pathname in the file parameter, as demonstrated by reading database configuration information from mainfile.php. | [
"cpe:2.3:a:ciamos:ciamos:0.9.2_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:e-xoops:e-xoops:1.05r3:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.1a:*:*:*:*:*:*:*"
] |
|
GHSA-xjm8-v6p6-5c3j | A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the id parameter at /getAssetContent. | [] |
|
CVE-2021-33694 | SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the application, resulting in Stored Cross-Site Scripting. | [
"cpe:2.3:a:sap:cloud_connector:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-28185 | NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the ECC layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to denial of service and data tampering. | [
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-2650 | Unify OpenStage / OpenScape Desk Phone IP before V3 R3.11.0 SIP has an OS command injection vulnerability in the web based management interface | [
"cpe:2.3:o:atos:openstage_80_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_80_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_80_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_60_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_60_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_60_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_40_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_40_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_40_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_20_e_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_20_e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_20_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_20_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_20_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_15_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_15_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_15_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_5_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openscape_desk_phone_ip_35g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openscape_desk_phone_ip_35g_eco_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openscape_desk_phone_ip_55g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*"
] |
|
GHSA-q775-qv8g-9c7h | The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. | [] |
|
CVE-2009-3869 | Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357. | [
"cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*"
] |
|
GHSA-2pwg-h86c-qrp2 | ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service. | [] |
|
GHSA-p5rr-j579-79g6 | Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses. | [] |
|
CVE-2023-21457 | Improper access control vulnerability in Bluetooth prior to SMR Mar-2023 Release 1 allows attackers to send file via Bluetooth without related permission. | [
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] |
|
GHSA-j4m7-28v7-p4cq | Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). | [] |
|
CVE-2024-49856 | x86/sgx: Fix deadlock in SGX NUMA node search | In the Linux kernel, the following vulnerability has been resolved:
x86/sgx: Fix deadlock in SGX NUMA node search
When the current node doesn't have an EPC section configured by firmware
and all other EPC sections are used up, CPU can get stuck inside the
while loop that looks for an available EPC page from remote nodes
indefinitely, leading to a soft lockup. Note how nid_of_current will
never be equal to nid in that while loop because nid_of_current is not
set in sgx_numa_mask.
Also worth mentioning is that it's perfectly fine for the firmware not
to setup an EPC section on a node. While setting up an EPC section on
each node can enhance performance, it is not a requirement for
functionality.
Rework the loop to start and end on *a* node that has SGX memory. This
avoids the deadlock looking for the current SGX-lacking node to show up
in the loop when it never will. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-wggh-wqhg-h7xc | D-Link G416 httpd Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to gain access to critical functions on the device. Was ZDI-CAN-21287. | [] |
|
CVE-2018-5890 | If the fdt_totalsize is reported as 0 for the current device tree, it bypasses an error check for a valid device tree in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-wwxq-g564-5hhr | IBM webMethods Integration 10.15 could allow an authenticated user to upload and execute arbitrary files which could be executed on the underlying operating system. | [] |
|
CVE-2014-1562 | Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-19844 | FROG CMS 0.9.5 has XSS via the admin/?/snippet/add name parameter, which is mishandled during an edit action, a related issue to CVE-2018-10319. | [
"cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*"
] |
|
CVE-2015-0817 | The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-43232 | Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchOrderData.php. | [
"cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-3860 | Visual Email Designer for WooCommerce < 1.7.2 - Multiple Author+ SQLi | The Visual Email Designer for WooCommerce WordPress plugin before 1.7.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author. | [
"cpe:2.3:a:smackcoders:visual_email_designer_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
GHSA-6mr6-ghhg-rwhx | The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering. | [] |
|
CVE-2021-26623 | Bandisoft ARK Library Out-of-bound Vulnerability | A remote code execution vulnerability due to incomplete check for 'xheader_decode_path_record' function's parameter length value in the ark library. Remote attackers can induce exploit malicious code using this function. | [
"cpe:2.3:a:bandisoft:bandizip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2024-5330 | Breakdance <= 1.7.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Breakdance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the breakdance_css_file_paths_cache parameter in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:breakdance:breakdance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:soflyy:breakdance:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-41314 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the iface parameter in the vif_disable function. | [
"cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:*"
] |
|
GHSA-3r53-83gh-9p5m | Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer. | [] |
|
GHSA-mjr9-8cjw-xwx2 | Cross-site scripting (XSS) vulnerability in the Custom Search module 6.x-1.x before 6.x-1.12 and 7.x-1.x before 7.x-1.14 for Drupal allows remote authenticated users with the "administer custom search" permission to inject arbitrary web script or HTML via the "Label text" field to admin/config/search/custom_search/results. | [] |
|
CVE-2021-46654 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15540. | [
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-2843 | Cross-site scripting (XSS) vulnerability in infoware MapSuite MapAPI 1.0.x before 1.0.36 and 1.1.x before 1.1.49 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:infoware:mapsuite:*:*:*:*:*:*:*:*"
] |
|
GHSA-qq6w-r4g7-hqp4 | SQL injection vulnerability in Techno Dreams Mailing List script allows remote attackers to execute arbitrary SQL commands and bypass authentication via the userid parameter in admin/login.asp. | [] |
|
CVE-2017-0880 | A denial of service vulnerability in the Android media framework (libskia). Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID A-65646012. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-3fv6-q5xv-fhpw | Malicious Package in coffee-project | Version 1.7.5 of `coffee-project` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationIf version 1.7.5 of this module is found installed you will want to replace it with a version before or after 1.7.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 1.7.4 | [] |
CVE-2024-0656 | The Password Protected – Ultimate Plugin to Password Protect Your WordPress Content with Ease plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Captcha Site Key in all versions up to, and including, 2.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
|
CVE-2019-5371 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] |
|
CVE-2012-6096 | Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable. | [
"cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-4559 | Bettershop LaikeTui POST Request unrestricted upload | A vulnerability, which was classified as critical, has been found in Bettershop LaikeTui. Affected by this issue is some unknown functionality of the file index.php?module=api&action=user&m=upload of the component POST Request Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-238160. | [
"cpe:2.3:a:laiketui:laiketui:-:*:*:*:*:*:*:*"
] |
CVE-2023-2742 | AI ChatBot < 4.5.5 - Admin+ Stored Cross-Site Scripting | The AI ChatBot WordPress plugin before 4.5.5 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | [
"cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*"
] |
CVE-2023-41868 | WordPress Stagtools Plugin <= 2.3.7 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ram Ratan Maurya, Codestag StagTools plugin <= 2.3.7 versions. | [
"cpe:2.3:a:codestag:stagtools:*:*:*:*:*:wordpress:*:*"
] |
CVE-2021-26441 | Storage Spaces Controller Elevation of Privilege Vulnerability | Storage Spaces Controller Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19041.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19041.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20144:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20144:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"
] |
GHSA-3v7c-p24m-p9gr | Juniper Networks Junos OS 16.1R1, and services releases based off of 16.1R1, are vulnerable to the receipt of a crafted BGP Protocol Data Unit (PDU) sent directly to the router, which can cause the RPD routing process to crash and restart. Unlike BGP UPDATEs, which are transitive in nature, this issue can only be triggered by a packet sent directly to the IP address of the router. Repeated crashes of the rpd daemon can result in an extended denial of service condition. This issue only affects devices running Junos OS 16.1R1 and services releases based off of 16.1R1 (e.g. 16.1R1-S1, 16.1R1-S2, 16.1R1-S3). No prior versions of Junos OS are affected by this vulnerability, and this issue was resolved in Junos OS 16.2 prior to 16.2R1. No other Juniper Networks products or platforms are affected by this issue. This issue was found during internal product security testing. | [] |
|
CVE-2018-1649 | IBM QRadar Incident Forensics 7.2 and 7.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 144655. | [
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:patch1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:patch13:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:patch8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:patch3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:patch4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_incident_forensics:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-46319 | Remote Code Execution (RCE) vulnerability exists in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicious users can use this vulnerability to use "\ " or backticks to bypass the shell metacharacters in the ssid0 or ssid1 parameters to execute arbitrary commands.This vulnerability is due to the fact that CVE-2019-17509 is not fully patched and can be bypassed by using line breaks or backticks on its basis. | [
"cpe:2.3:o:dlink:dir-846_firmware:100a43:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-846:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-846_firmware:100a53dla:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-846:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-1000153 | A cross-site request forgery vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.java, Rename.java, RenameSnapshot.java, RevertToSnapshot.java, SuspendVm.java, TakeSnapshot.java, VSphereBuildStepContainer.java, vSphereCloudProvisionedSlave.java, vSphereCloudSlave.java, vSphereCloudSlaveTemplate.java, VSphereConnectionConfig.java, vSphereStep.java that allows attackers to perform form validation related actions, including sending numerous requests to the configured vSphere server, potentially resulting in denial of service, or send credentials stored in Jenkins with known ID to an attacker-specified server ("test connection"). | [
"cpe:2.3:a:jenkins:vsphere:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-j94c-gq4f-5mqq | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2024-37363 | Hitachi Vantara Pentaho Business Analytics Server - Incorrect Authorization | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)
Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, do not correctly perform an authorization check in the data source management service.
When access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service. | [] |
CVE-2022-40609 | IBM SDK, Java Technology Edition code execution | IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069. | [
"cpe:2.3:a:ibm:sdk:*:*:*:*:java_technology:*:*:*"
] |
GHSA-57f2-52wj-7vj6 | Agent-to-controller security bypass in Jenkins BMC Compuware ISPW Operations plugin | BMC Compuware ISPW Operations Plugin defines a controller/agent message that retrieves Java system properties. BMC Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of the controller/agent message to agents. This allows attackers able to control agent processes to retrieve Java system properties. This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3). BMC Compuware ISPW Operations plugin 1.0.9 does not allow the affected controller/agent message to be submitted by agents for execution on the controller. | [] |
CVE-2009-1086 | Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field. | [
"cpe:2.3:a:nlnetlabs:ldns:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:ldns:1.4.1:*:*:*:*:*:*:*"
] |
|
GHSA-9vq2-w47q-3pjh | A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to bypass Privacy preferences. | [] |
|
GHSA-h9qp-87rf-3frv | Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Payments accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 8.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H). | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.