id
				 
			stringlengths 12 
			47 
			 | title
				 
			stringlengths 0 
			256 
			⌀  | description
				 
			stringlengths 3 
			189k 
			 | cpes
				 
			listlengths 0 
			5.42k 
			 | cvss_v4_0
				 
			float64 0 
			10 
			⌀  | cvss_v3_1
				 
			float64 0 
			10 
			⌀  | cvss_v3_0
				 
			float64 0 
			10 
			⌀  | cvss_v2_0
				 
			float64 0 
			10 
			⌀  | patch_commit_url
				 
			stringlengths 38 
			232 
			⌀  | 
|---|---|---|---|---|---|---|---|---|
	GHSA-2g5m-5chx-p2ww 
 | 
	A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8383. 
 | 
	[]  | null  | null  | 4.3 
							 | null  | null  | 
					|
	RHSA-2025:16372 
 | 
	Red Hat Security Advisory: kernel security update 
 | 
	kernel: vsock: Fix transport_* TOCTOU kernel: do_change_type(): refuse to operate on unmounted/not ours mounts kernel: HID: core: Harden s32ton() against conversion to 0 bits 
 | 
	[
  "cpe:/a:redhat:enterprise_linux:8::crb",
  "cpe:/o:redhat:enterprise_linux:8::baseos"
]  | null  | 7.1 
							 | null  | null  | null  | 
					
	GHSA-pgp4-m4pc-4jr6 
 | 
	The Virtual Network Terminal Server daemon (vntsd) for Logical Domains (aka LDoms) in Sun Solaris 10, and OpenSolaris snv_41 through snv_108, on SPARC platforms does not check authorization for guest console access, which allows local control-domain users to gain guest-domain privileges via unknown vectors. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	CVE-2017-14822 
 | 
	This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the xOsiz member of SIZ markers. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5014. 
 | 
	[
  "cpe:2.3:a:foxitsoftware:foxit_reader:8.3.1.21155:*:*:*:*:*:*:*"
]  | null  | null  | 6.5 
							 | 4.3 
							 | null  | 
					|
	GHSA-r62c-r4cc-9fvj 
 | 
	The mintToken function of a smart contract implementation for GalaxyCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. 
 | 
	[]  | null  | null  | 7.5 
							 | null  | null  | 
					|
	GHSA-qfrp-89jw-777c 
 | 
	Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.4), 9.2 before 9.2(4), 9.3 before 9.3(3.1), and 9.4 before 9.4(1.1) allows remote attackers to cause a denial of service (device reload) via a crafted DNS response, aka Bug ID CSCut03495. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-m574-9366-9235 
 | 
	Substance3D - Viewer versions 0.25 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 
 | 
	[]  | null  | 7.8 
							 | null  | null  | null  | 
					|
	CVE-2014-0148 
 | 
	Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS. 
 | 
	[
  "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_openstack_platform:5:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
  "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
]  | null  | 5.5 
							 | null  | null  | null  | 
					|
	CVE-2014-3453 
 | 
	Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import.  NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page. 
 | 
	[
  "cpe:2.3:a:flag_module_project:flag:*:*:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:-:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha1:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha2:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha3:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha4:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:beta1:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.0:rc1:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.1:*:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.2:*:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.3:*:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.4:*:*:*:*:drupal:*:*",
  "cpe:2.3:a:flag_module_project:flag:7.x-3.x:dev:*:*:*:drupal:*:*"
]  | null  | null  | null  | 6.5 
							 | null  | 
					|
	GHSA-7cp6-q2fv-7m82 
 | 
	Telepad allows remote unauthenticated users to send instructions to the server to execute arbitrary code without any previous authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 
 | 
	[]  | null  | 9.8 
							 | null  | null  | null  | 
					|
	CVE-2024-48648 
 | 
	A Reflected Cross-Site Scripting (XSS) vulnerability exists in the Sage 1000 v 7.0.0. This vulnerability allows attackers to inject malicious scripts into URLs, which are reflected back by the server in the response without proper sanitization or encoding. 
 | 
	[]  | null  | 6.1 
							 | null  | null  | null  | 
					|
	RHSA-2013:1829 
 | 
	Red Hat Security Advisory: nss, nspr, and nss-util security update 
 | 
	nss: Avoid uninitialized data read in the event of a decryption failure nss: Integer truncation in certificate parsing (MFSA 2013-103) nss: Null_Cipher() does not respect maxOutputLen  (MFSA 2013-103) nss: CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates (MFSA 2013-103) nspr: Avoid unsigned integer wrapping in PL_ArenaAllocate (MFSA 2013-103) 
 | 
	[
  "cpe:/o:redhat:enterprise_linux:6::client",
  "cpe:/o:redhat:enterprise_linux:6::computenode",
  "cpe:/o:redhat:enterprise_linux:6::server",
  "cpe:/o:redhat:enterprise_linux:6::workstation"
]  | null  | null  | null  | null  | null  | 
					
	CVE-2020-9818 
 | 
	An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5. Processing a maliciously crafted mail message may lead to unexpected memory modification or application termination. 
 | 
	[
  "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]  | null  | 8.8 
							 | null  | 6.8 
							 | null  | 
					|
	GHSA-2c9q-7wm6-r5xc 
 | 
	Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm-core prior to 8.3.0. 
 | 
	[]  | null  | null  | 7.6 
							 | null  | null  | 
					|
	GHSA-gvh8-jh2q-c22g 
 | 
	An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands. 
 | 
	[]  | null  | 7.5 
							 | null  | null  | null  | 
					|
	GHSA-4ph9-c9g2-q29q 
 | 
	Directory traversal vulnerability in index.php in iFoto 1.0.1 and earlier allows remote attackers to list arbitrary directories, and possibly download arbitrary photos, via a .. (dot dot) in the dir parameter. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-4q4r-vqwr-24p4 
 | 
	** DISPUTED **  PHP remote file inclusion vulnerability in includes/functions.php in phpSCMS 0.0.1-Alpha1 allows remote attackers to execute arbitrary PHP code via a URL in the dir parameter.  NOTE: this issue is disputed by CVE because the identified code is in a function that is not accessible via direct request. 
 | 
	[]  | null  | 9.8 
							 | null  | null  | null  | 
					|
	CVE-2024-5924 
 | 
	Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability 
 | 
	Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Dropbox Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of shared folders. When syncing files from a shared folder belonging to an untrusted account, the Dropbox desktop application does not apply the Mark-of-the-Web to the local files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23991. 
 | 
	[
  "cpe:2.3:a:dropbox:dropbox:198.4.7615:*:*:*:*:*:*:*",
  "cpe:2.3:a:dropbox:dropbox_desktop:198.4.7615:*:*:*:*:*:*:*"
]  | null  | null  | 8.8 
							 | null  | null  | 
					
	GHSA-638f-v29c-5qwq 
 | 
	Improper access control vulnerability in GedSamsungAccount.kt SmartThings prior to version 1.7.89.0 allows attackers to access sensitive information via implicit broadcast. 
 | 
	[]  | null  | 7.5 
							 | null  | null  | null  | 
					|
	CVE-2016-6930 
 | 
	Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932. 
 | 
	[
  "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
  "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
  "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
  "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
  "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
  "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*"
]  | null  | 8.8 
							 | null  | 9.3 
							 | null  | 
					|
	RHSA-2020:2516 
 | 
	Red Hat Security Advisory: libexif security update 
 | 
	libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS 
 | 
	[
  "cpe:/o:redhat:enterprise_linux:6::client",
  "cpe:/o:redhat:enterprise_linux:6::computenode",
  "cpe:/o:redhat:enterprise_linux:6::server",
  "cpe:/o:redhat:enterprise_linux:6::workstation"
]  | null  | 9.1 
							 | null  | null  | null  | 
					
	CVE-2024-8695 
 | 
	A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2. 
 | 
	A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2. 
 | 
	[
  "cpe:2.3:a:docker:docker_desktop:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*"
]  | 9 
							 | null  | null  | null  | null  | 
					
	GHSA-qqv8-ph7f-h3f7 
 | 
	OpenShift Builder has a path traversal, allows command injection in privileged BuildContainer 
 | 
	A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the "Docker" strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container. 
 | 
	[]  | 6.4 
							 | 9.1 
							 | null  | null  | null  | 
					
	CVE-2017-3510 
 | 
	Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones virtualized NIC driver). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data. CVSS 3.0 Base Score 7.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N). 
 | 
	[
  "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
]  | null  | null  | 9.6 
							 | 5.5 
							 | null  | 
					|
	RHSA-2019:2053 
 | 
	Red Hat Security Advisory: libtiff security update 
 | 
	libtiff: buffer overflow in gif2tiff libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c libtiff: Out-of-bounds write in tif_jbig.c libtiff: tiff2bw tool failed memory allocation leads to crash 
 | 
	[
  "cpe:/o:redhat:enterprise_linux:7::client",
  "cpe:/o:redhat:enterprise_linux:7::computenode",
  "cpe:/o:redhat:enterprise_linux:7::server",
  "cpe:/o:redhat:enterprise_linux:7::workstation"
]  | null  | null  | 3.3 
							 | null  | null  | 
					
	CVE-2023-38162 
 | 
	DHCP Server Service Denial of Service Vulnerability 
 | 
	DHCP Server Service Denial of Service Vulnerability 
 | 
	[
  "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
]  | null  | 7.5 
							 | null  | null  | null  | 
					
	RHSA-2022:5696 
 | 
	Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update 
 | 
	OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) 
 | 
	[
  "cpe:/a:redhat:enterprise_linux:8::appstream",
  "cpe:/a:redhat:enterprise_linux:8::crb"
]  | null  | 7.5 
							 | null  | null  | null  | 
					
	PYSEC-2020-148 
 | null  | 
	urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					
	GHSA-83pv-rgxm-9x6f 
 | 
	A vulnerability, which was classified as critical, was found in TOTOLINK A3002RU 3.0.0-B20230809.1615. Affected is an unknown function of the file /boafrm/formParentControl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. 
 | 
	[]  | 7.4 
							 | 8.8 
							 | null  | null  | null  | 
					|
	CVE-2020-35525 
 | 
	In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing. 
 | 
	[
  "cpe:2.3:a:sqlite:sqlite:3.31.1:*:*:*:*:*:*:*"
]  | null  | 7.5 
							 | null  | null  | null  | 
					|
	GHSA-5hqf-mjf3-68pw 
 | 
	A vulnerability was found in SourceCodester Simple E-Learning System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /claire_blake. The manipulation of the argument phoneNumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205820. 
 | 
	[]  | null  | 6.5 
							 | null  | null  | null  | 
					|
	CVE-2014-7539 
 | 
	The Zhang Zhijun Taiwan Visit 2014-06-25 (aka com.zizizzi) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. 
 | 
	[
  "cpe:2.3:a:zhang_zhijun_taiwan_visit_2014-06-25_project:zhang_zhijun_taiwan_visit_2014-06-25:1.0:*:*:*:*:android:*:*"
]  | null  | null  | null  | 5.4 
							 | null  | 
					|
	CVE-2021-27736 
 | 
	FusionAuth fusionauth-samlv2 before 0.5.4 allows XXE attacks via a forged AuthnRequest or LogoutRequest because parseFromBytes uses javax.xml.parsers.DocumentBuilderFactory unsafely. 
 | 
	[
  "cpe:2.3:a:fusionauth:saml_v2:*:*:*:*:*:*:*:*"
]  | null  | 6.5 
							 | null  | 4 
							 | null  | 
					|
	GHSA-9h47-8w3f-83c6 
 | 
	A buffer overflow vulnerability in the NSDP protocol authentication method on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote unauthenticated attackers to force a device reboot. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-grq5-cg54-wp35 
 | 
	TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the password parameter in the function urldecode. 
 | 
	[]  | null  | 8.8 
							 | null  | null  | null  | 
					|
	RHSA-2020:3232 
 | 
	Red Hat Security Advisory: kernel security and bug fix update 
 | 
	kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c 
 | 
	[
  "cpe:/o:redhat:rhel_aus:7.2::server"
]  | null  | 7.1 
							 | null  | null  | null  | 
					
	CVE-2023-38955 
 | 
	ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to obtain sensitive information about all managed devices, including their IP addresses and device names. 
 | 
	[
  "cpe:2.3:a:zkteco:bioaccess_ivs:3.3.1:*:*:*:*:*:*:*"
]  | null  | 7.5 
							 | null  | null  | null  | 
					|
	CVE-2022-29882 
 | 
	A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user. 
 | 
	[
  "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*",
  "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*"
]  | null  | 6.1 
							 | null  | 4.3 
							 | null  | 
					|
	GHSA-8vgw-329g-hrw6 
 | 
	Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated attacker with Administrator-level read-only credentials to elevate their privileges to Administrator with read-write credentials on an affected system. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details section of this advisory. 
 | 
	[]  | null  | null  | 9.6 
							 | null  | null  | 
					|
	GHSA-rhj2-38xr-rmqr 
 | 
	A vulnerability classified as problematic has been found in Campcodes Online Examination System 1.0. Affected is an unknown function of the file /adminpanel/admin/facebox_modal/updateExaminee.php. The manipulation of the argument id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258030 is the identifier assigned to this vulnerability. 
 | 
	[]  | null  | 3.5 
							 | null  | null  | null  | 
					|
	GHSA-75m8-3848-hgx7 
 | 
	Cross Site Scripting (XSS) vulnerability in the Simple Student Attendance System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the page or class_month parameter in the /php-attendance/attendance_report component. 
 | 
	[]  | null  | 6.1 
							 | null  | null  | null  | 
					|
	CVE-2024-41010 
 | 
	bpf: Fix too early release of tcx_entry 
 | 
	In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix too early release of tcx_entry
Pedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reported
an issue that the tcx_entry can be released too early leading to a use
after free (UAF) when an active old-style ingress or clsact qdisc with a
shared tc block is later replaced by another ingress or clsact instance.
Essentially, the sequence to trigger the UAF (one example) can be as follows:
  1. A network namespace is created
  2. An ingress qdisc is created. This allocates a tcx_entry, and
     &tcx_entry->miniq is stored in the qdisc's miniqp->p_miniq. At the
     same time, a tcf block with index 1 is created.
  3. chain0 is attached to the tcf block. chain0 must be connected to
     the block linked to the ingress qdisc to later reach the function
     tcf_chain0_head_change_cb_del() which triggers the UAF.
  4. Create and graft a clsact qdisc. This causes the ingress qdisc
     created in step 1 to be removed, thus freeing the previously linked
     tcx_entry:
     rtnetlink_rcv_msg()
       => tc_modify_qdisc()
         => qdisc_create()
           => clsact_init() [a]
         => qdisc_graft()
           => qdisc_destroy()
             => __qdisc_destroy()
               => ingress_destroy() [b]
                 => tcx_entry_free()
                   => kfree_rcu() // tcx_entry freed
  5. Finally, the network namespace is closed. This registers the
     cleanup_net worker, and during the process of releasing the
     remaining clsact qdisc, it accesses the tcx_entry that was
     already freed in step 4, causing the UAF to occur:
     cleanup_net()
       => ops_exit_list()
         => default_device_exit_batch()
           => unregister_netdevice_many()
             => unregister_netdevice_many_notify()
               => dev_shutdown()
                 => qdisc_put()
                   => clsact_destroy() [c]
                     => tcf_block_put_ext()
                       => tcf_chain0_head_change_cb_del()
                         => tcf_chain_head_change_item()
                           => clsact_chain_head_change()
                             => mini_qdisc_pair_swap() // UAF
There are also other variants, the gist is to add an ingress (or clsact)
qdisc with a specific shared block, then to replace that qdisc, waiting
for the tcx_entry kfree_rcu() to be executed and subsequently accessing
the current active qdisc's miniq one way or another.
The correct fix is to turn the miniq_active boolean into a counter. What
can be observed, at step 2 above, the counter transitions from 0->1, at
step [a] from 1->2 (in order for the miniq object to remain active during
the replacement), then in [b] from 2->1 and finally [c] 1->0 with the
eventual release. The reference counter in general ranges from [0,2] and
it does not need to be atomic since all access to the counter is protected
by the rtnl mutex. With this in place, there is no longer a UAF happening
and the tcx_entry is freed at the correct time. 
 | 
	[
  "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]  | null  | 5.5 
							 | null  | null  | null  | 
					
	GHSA-8p6f-vvq5-p9xx 
 | 
	Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the function set_device_name. 
 | 
	[]  | null  | 9.8 
							 | null  | null  | null  | 
					|
	GHSA-48xg-22gf-h585 
 | 
	Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17021. 
 | 
	[]  | null  | 5.4 
							 | null  | null  | null  | 
					|
	GHSA-cwwh-8p3m-623m 
 | 
	An elevation of privilege vulnerability exists in Microsoft Dynamics 365 Commerce, aka 'Dynamics 365 Commerce Elevation of Privilege Vulnerability'. 
 | 
	[]  | null  | 6.5 
							 | null  | null  | null  | 
					|
	CVE-2016-7066 
 | 
	It was found that the improper default permissions on /tmp/auth directory in JBoss Enterprise Application Platform before 7.1.0 can allow any local user to connect to CLI and allow the user to execute any arbitrary operations. 
 | 
	[
  "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*"
]  | null  | null  | 7.8 
							 | 4.6 
							 | null  | 
					|
	CVE-2024-48855 
 | 
	Vulnerabilities in TIFF and PCX Image Codecs Impact QNX Software Development Platform 
 | 
	Out-of-bounds read in the TIFF image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause an information disclosure in the context of the process using the image codec. 
 | 
	[]  | null  | 5.3 
							 | null  | null  | null  | 
					
	GHSA-m7cj-ph5p-mg4w 
 | 
	Dell G7 17 7790 BIOS versions prior to 1.13.2 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in System Management Mode (SMM). 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	CVE-2014-9154 
 | 
	The Notify module 7.x-1.x before 7.x-1.1 for Drupal does not properly restrict access to (1) new or (2) modified nodes or (3) their fields, which allows remote authenticated users to obtain node titles, teasers, and fields by reading a notification email. 
 | 
	[
  "cpe:2.3:a:notify_project:notify:7.x-1.0:*:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha1:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha2:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha3:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha4:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha5:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha6:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha7:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha8:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:alpha9:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:rc1:*:*:*:drupal:*:*",
  "cpe:2.3:a:notify_project:notify:7.x-1.0:rc2:*:*:*:drupal:*:*"
]  | null  | null  | null  | 4 
							 | null  | 
					|
	CVE-2022-45550 
 | 
	AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE). 
 | 
	[
  "cpe:2.3:a:ayacms_project:ayacms:3.1.2:*:*:*:*:*:*:*"
]  | null  | 9.8 
							 | null  | null  | null  | 
					|
	GHSA-hvh8-j8p5-8pp9 
 | 
	Huawei S12700 switches with software before V200R008C00SPC500 and S5700 switches with software before V200R005SPH010, when the debug switch is enabled, allows remote attackers to cause a denial of service or execute arbitrary code via crafted DNS packets. 
 | 
	[]  | null  | null  | 8.1 
							 | null  | null  | 
					|
	GHSA-r2w8-jwh3-x7vc 
 | 
	The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	CVE-2024-21009 
 | 
	Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 
 | 
	[
  "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*",
  "cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*",
  "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
  "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
  "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
  "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
  "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
]  | null  | 4.9 
							 | null  | null  | null  | 
					|
	ICSA-23-026-07 
 | 
	Landis+Gyr E850 
 | 
	Landis+Gyr E850 (ZMQ200) web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values.-CVE-2022-3083 has been assigned to this vulnerability. A CVSS v3 base score of 3.9 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L). 
 | 
	[]  | null  | null  | 3.9 
							 | null  | null  | 
					
	CVE-2009-3128 
 | 
	Microsoft Office Excel 2002 SP3 and 2003 SP3, and Office Excel Viewer 2003 SP3, does not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a spreadsheet with a malformed record object, aka "Excel SxView Memory Corruption Vulnerability." 
 | 
	[
  "cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp1:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp2:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel_viewer:*:sp1:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel_viewer:*:sp2:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
  "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
  "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
]  | null  | null  | null  | 9.3 
							 | null  | 
					|
	GHSA-xjvm-vf2p-w3rh 
 | 
	IBM MQ 9.1 LTS, 9.2 LTS, and 9.1 CD AMQP Channels could allow an authenticated user to cause a denial of service due to an issue processing messages. IBM X-Force ID: 191747. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-h4wp-5c5q-58qf 
 | 
	When BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.1.0-2.3.0, or Enterprise Manager 3.1.1 is licensed for Appliance Mode, Admin and Resource administrator roles can by-pass BIG-IP Appliance Mode restrictions to overwrite critical system files. Attackers of high privilege level are able to overwrite critical system files which bypasses security controls in place to limit TMSH commands. This is possible with an administrator or resource administrator roles when granted TMSH. Resource administrator roles must have TMSH access in order to perform this attack. 
 | 
	[]  | null  | null  | 4.9 
							 | null  | null  | 
					|
	GHSA-44w8-g2pc-jwwm 
 | 
	Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution. 
 | 
	[]  | null  | null  | 9.8 
							 | null  | null  | 
					|
	RHSA-2007:0068 
 | 
	Red Hat Security Advisory: postgresql security update 
 | 
	security flaw security flaw New version fixes three different crash vulnerabilities security flaw security flaw 
 | 
	[
  "cpe:/o:redhat:enterprise_linux:5::client",
  "cpe:/o:redhat:enterprise_linux:5::client_workstation",
  "cpe:/o:redhat:enterprise_linux:5::server"
]  | null  | null  | null  | null  | null  | 
					
	GHSA-f7fv-v9rh-prvc 
 | 
	Tornado CRLF injection vulnerability 
 | 
	CRLF injection vulnerability in the `tornado.web.RequestHandler.set_header` function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input. 
 | 
	[]  | 8.7 
							 | 7.5 
							 | null  | null  | null  | 
					
	CVE-2006-6992 
 | 
	Cross-domain vulnerability in GoSuRF Browser 2.62 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280. 
 | 
	[
  "cpe:2.3:a:gosurf_browser:gosurf_browser:2.62:*:*:*:*:*:*:*"
]  | null  | null  | null  | 7.8 
							 | null  | 
					|
	GHSA-53w3-ppjp-j9r6 
 | 
	SQL injection vulnerability in native-php-cms 1.0 allows remote attackers to run arbitrary SQL commands via the cat parameter to /list.php file. 
 | 
	[]  | null  | 9.8 
							 | null  | null  | null  | 
					|
	CVE-2008-5002 
 | 
	Insecure method vulnerability in the ChilkatCrypt2.ChilkatCrypt2.1 ActiveX control (ChilkatCrypt2.dll 4.3.2.1) in Chilkat Crypt ActiveX Component allows remote attackers to create and overwrite arbitrary files via the WriteFile method.  NOTE: this could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs.  NOTE: some of these details are obtained from third party information. 
 | 
	[
  "cpe:2.3:a:chilkat_software:chilkat_crypt_activex_control:2.1:*:*:*:*:*:*:*"
]  | null  | null  | null  | 9.3 
							 | null  | 
					|
	CVE-2017-15778 
 | 
	XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at CADImage+0x0000000000285de7." 
 | 
	[
  "cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]  | null  | null  | 7.8 
							 | 6.8 
							 | null  | 
					|
	GHSA-hx7h-9vf7-5xhg 
 | 
	Uptime Kuma's Regular Expression in pushdeeer and whapi file Leads to ReDoS Vulnerability Due to Catastrophic Backtracking 
 | 
	SummaryThere is a `ReDoS vulnerability risk` in the system, specifically when administrators create `notification` through the web service(`pushdeer` and `whapi`). If a string is provided that triggers catastrophic backtracking in the regular expression, it may lead to a ReDoS attack.DetailsThe regular expression` \/*$\` is used to match zero or more slashes `/` at the end of a URL. When a malicious attack string appends a large number of slashes `/` and a non-slash character at the end of the URL, the regular expression enters a backtracking matching process. During this process, the regular expression engine starts checking each slash from the first one, continuing until it encounters the last non-slash character. Due to the greedy matching nature of the regular expression, this process repeats itself, with each backtrack checking the next slash until the last slash is checked. This backtracking process consumes significant CPU resources.For the regular expression `/\/*$/`, an attack string likecan trigger catastrophic backtracking, causing the web service to freeze and potentially leading to a ReDoS attack.When entered from the web interface, the attack string needs to expand `"/".repeat(100000)` and be input directly, such as `https://e/////////..//@`. This triggers catastrophic backtracking, leading to web service lag and posing a potential ReDoS attack risk.PoCThe poc.js is in: 
https://gist.github.com/ShiyuBanzhou/26c918f93b07f5ce90e8f7000d29c7a0
The time lag phenomenon can be observed through test-pushdeer-ReDos, which helps verify the presence of the ReDoS attack:Move the `test-uptime-calculator.js` file to the `./uptime-kuma/test/backend-test` folder and run `npm run test-backend` to execute the backend tests.Trigger conditions for whapi jams, In the send function within the `uptime-kuma\server\notification-providers\pushdeer.js` file:
https://gist.github.com/ShiyuBanzhou/bf4cee61603e152c114fa8c4791f9f28After running, a noticeable lag can be observed, with the regular expression matching time increasing from a few milliseconds to over 2000 milliseconds.
<img width="760" alt="redos" src="https://github.com/user-attachments/assets/98f18fee-7555-410e-98c8-763906843812" />You can also perform this attack on the web interface. By timing the operation, it can be observed that the lag still occurs. The key to the attack string is appending a large number of `/` to the URL, followed by a `non-/` character at the end, entered directly.Impact**What kind of vulnerability is it?**This is a `Regular Expression Denial of Service (ReDoS)` vulnerability. ReDoS exploits poorly designed regular expressions that can lead to excessive backtracking under certain input conditions, causing the affected application to consume high CPU and memory resources. This can result in `significant performance degradation or complete service unavailability`, especially when processing specially crafted attack strings.**Who is impacted?****Uptime Kuma users**:
Any users or administrators running the Uptime Kuma project are potentially affected, especially if they allow untrusted input through the web interface or notification services like `pushdeer.js` and `whapi.js`. Attackers can exploit this vulnerability by injecting crafted strings into the input fields.**Web services and hosting providers**:
If Uptime Kuma is deployed in a production environment, the vulnerability could impact hosting providers or servers running the application, leading to `downtime`, `degraded performance`, or `resource exhaustion`.Solution@louislam I have provided a solution for you to check:https://github.com/louislam/uptime-kuma/pull/5573 
 | 
	[]  | 6.7 
							 | null  | null  | null  | null  | 
					
	CVE-2008-3723 
 | 
	Directory traversal vulnerability in index.php in PHPizabi 0.848b C1 HFP3 allows remote authenticated administrators to read arbitrary files via (1) a .. (dot dot), (2) a URL, or possibly (3) a full pathname in the id parameter in an admin.templates.edittemplate action.  NOTE: some of these details are obtained from third party information. 
 | 
	[
  "cpe:2.3:a:phpizabi:phpizabi:0.848b:c1_hfp3:*:*:*:*:*:*"
]  | null  | null  | null  | 6.3 
							 | null  | 
					|
	GHSA-hq58-p9mv-338c 
 | 
	CometBFT's default for `BlockParams.MaxBytes` consensus parameter may increase block times and affect consensus participation 
 | 
	Amulet Security Advisory for CometBFT: ASA-2023-002**Component**: CometBFT
**Criticality:** Low
**Affected versions:** All
**Affected users:** Validators, Chain Builders + MaintainersSummaryA default configuration in CometBFT has been found to be large for common use cases, and may affect block times and consensus participation when fully utilized by chain participants. It is advised that chains consider their specific needs for their use case when setting the `BlockParams.MaxBytes` consensus parameter. Chains are encouraged to evaluate the impact of having proposed blocks with the maximum allowed block size, especially on bandwidth usage and block latency. Additionally, the `timeout_propose` parameter should be computed using the maximum allowed block size as a reference. This issue does not represent an actively exploitable vulnerability that would result in a direct loss of funds, however it may have a slight impact on block latency depending on a network’s topography.When setting a large `BlockParams.MaxBytes`, there are two main implications:Increased bandwidth to propagate a blockIncreased latency to propagate a blockWhen combined, this may result in less round participation, and in some cases additional rounds may be required to meet the consensus threshold, which could lead to timeouts depending on the topography of a network and environmental factors. These factors can include the number of validators on a network, geographic distribution, network connectivity (including latency, bandwidth, and reachability), the functionality of the modules implementing the logic for a transaction in your chain, etc.  The cost to propagate a 21MB block, the default value for `BlockParams.MaxBytes`, will be far higher than the cost of propagating a smaller 1MB block. CometBFT recommends tuning this parameter to a smaller limit if full initial-round participation is an important quality for your chain.ConsiderationsCometBFT is designed to be configurable by chains, and implements many different configuration variables and parameters to allow chain developers, validators, node operators, and chain participants to customize it best to their use case. A high-performing validator may find it necessary to experiment with tuning local configuration, optimizing network and compute resources, and implementing controls to inhibit spam.Next Steps for Chains and ValidatorsTo increase awareness of the potential impacts of this default parameter, the CometBFT team has updated the documentation (https://github.com/cometbft/cometbft/pull/1405, [v0.34.x](https://docs.cometbft.com/v0.34/spec/abci/apps#blockparamsmaxbytes), [v0.37.x](https://docs.cometbft.com/v0.37/spec/abci/abci++_app_requirements#blockparamsmaxbytes), [v0.38.x](https://docs.cometbft.com/v0.38/spec/abci/abci++_app_requirements#blockparamsmaxbytes)) for builders and maintainers of chain applications. Additionally, it is recommended that:Chain ecosystems and their maintainers set a `BlockParams.MaxBytes` configuration appropriate for their use case at the application level; in some cases, fine-tuning `BlockParams` may require a network upgrade.Chain ecosystems and their maintainers evaluate how gas is used and required on their chain, including gas and fee parameters, no-fee or fee-exempt message policies, and ensure that any custom modules integrate with the gas and fee frameworks. This is especially important for chains that may have implemented custom modules or functionality to allow IBC messages to bypass fees.Chain ecosystems and their maintainers audit all of their currently-set parameters and configurations to ensure that they are appropriate for their use case.All validators develop and implement anti-spam measures on their nodes. Amulet encourages validators to form working groups to collaborate on spam prevention and on tooling that can be implemented by node operators across the Interchain.All validators consider developing and implementing tooling that would allow them to sample incoming transactions to enable them to fine-tune the level of service they would like to provide to be resilient in slowdown scenarios. Amulet also encourages validators to collaborate on tooling that can be implemented by node operators across the Interchain.The CometBFT team has also revisited all the checks performed by the consensus protocol regarding proposed blocks. This investigation has confirmed that proposed blocks with size exceeding the `BlockParams.MaxBytes` limit established by the application are not accepted by nodes. The team notwithstanding has decided to introduce additional sanity checks for the size of proposed blocks (https://github.com/cometbft/cometbft/pull/1408), allowing for an early identification and rejection of invalid or oversized blocks. These code changes will be included in the _next_ release of each branch of CometBFT.As more chains adopt the Interchain Stack for new and cutting-edge use cases, the CometBFT team recommends that all chains regularly evaluate their parameters and configurations to ensure they meet the needs of their ecosystem as their networks mature.For more information about CometBFT, see [https://docs.cometbft.com](https://docs.cometbft.com/).This issue was reported via the vulnerability disclosure channel at [[email protected]](mailto:[email protected]) on Friday, September 23, 2023. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see [https://hackerone.com/cosmos](https://hackerone.com/cosmos).Note from Amulet on the Security Advisory Process:In the interest of timely resolution of this issue for validators and node operators, the Amulet team has chosen to use existing processes and resources for distributing security advisories within the Cosmos and Interchain Ecosystems. Stay tuned as we implement an improved, more robust security advisory distribution system that will provide equitable access to information about security issues in the Interchain Stack. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					
	GHSA-v665-8rf9-gphr 
 | 
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving submission of a form to the about:blank URL, leading to security-context replacement. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-6qc7-cwg9-8f4p 
 | 
	Directory traversal vulnerability in tools/backlight_helper.c in X.Org xf86-video-intel 2.99.911 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the interface name. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	RHSA-2021:4236 
 | 
	Red Hat Security Advisory: tcpdump security and bug fix update 
 | 
	tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory 
 | 
	[
  "cpe:/a:redhat:enterprise_linux:8::appstream"
]  | null  | 7.5 
							 | null  | null  | null  | 
					
	CVE-2022-30385 
 | 
	Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/classes/Master.php?f=delete_order. 
 | 
	[
  "cpe:2.3:a:merchandise_online_store_project:merchandise_online_store:1.0:*:*:*:*:*:*:*"
]  | null  | 9.8 
							 | null  | 7.5 
							 | null  | 
					|
	RHSA-2024:10777 
 | 
	Red Hat Security Advisory: pcs security update 
 | 
	rexml: REXML ReDoS vulnerability 
 | 
	[
  "cpe:/a:redhat:rhel_e4s:9.0::highavailability",
  "cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
]  | null  | 7.5 
							 | null  | null  | null  | 
					
	CVE-2013-3956 
 | 
	The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call. 
 | 
	[
  "cpe:2.3:a:novell:client:4.91:sp5:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:novell:client:2.0:sp2:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:novell:client:2.0:sp3:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
  "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
]  | null  | null  | null  | 7.2 
							 | null  | 
					|
	CVE-2012-4331 
 | 
	Multiple unspecified vulnerabilities in SPIP before 1.9.2.o, 2.0.x before 2.0.18, and 2.1.x before 2.1.13 have unknown impact and attack vectors that are not related to cross-site scripting (XSS), different vulnerabilities than CVE-2012-2151. 
 | 
	[
  "cpe:2.3:a:spip:spip:1.9:*:*:*:*:*:*:*",
  "cpe:2.3:a:spip:spip:1.9.1:*:*:*:*:*:*:*",
  "cpe:2.3:a:spip:spip:1.9.2:*:*:*:*:*:*:*",
  "cpe:2.3:a:spip:spip:2.0:*:*:*:*:*:*:*",
  "cpe:2.3:a:spip:spip:2.1:*:*:*:*:*:*:*"
]  | null  | null  | null  | 10 
							 | null  | 
					|
	GHSA-w8wp-rv4w-h5pp 
 | 
	Sudo before 1.9.13p2 has a double free in the per-command chroot feature. 
 | 
	[]  | null  | 7.2 
							 | null  | null  | null  | 
					|
	CVE-2025-22173 
 | 
	Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view certain sprint data without the required permission. 
 | 
	[]  | 5.3 
							 | null  | null  | null  | null  | 
					|
	RHSA-2008:0270 
 | 
	Red Hat Security Advisory: libvorbis security update 
 | 
	vorbis: zero-dim codebooks can cause crash, infinite loop or heap overflow vorbis: integer overflow in partvals computation vorbis: integer oveflow caused by huge codebooks 
 | 
	[
  "cpe:/o:redhat:enterprise_linux:3::as",
  "cpe:/o:redhat:enterprise_linux:3::desktop",
  "cpe:/o:redhat:enterprise_linux:3::es",
  "cpe:/o:redhat:enterprise_linux:3::ws",
  "cpe:/o:redhat:enterprise_linux:4::as",
  "cpe:/o:redhat:enterprise_linux:4::desktop",
  "cpe:/o:redhat:enterprise_linux:4::es",
  "cpe:/o:redhat:enterprise_linux:4::ws",
  "cpe:/o:redhat:enterprise_linux:5::client",
  "cpe:/o:redhat:enterprise_linux:5::client_workstation",
  "cpe:/o:redhat:enterprise_linux:5::server"
]  | null  | null  | null  | null  | null  | 
					
	GHSA-39cj-3mcf-vq77 
 | 
	An elevation of privilege vulnerability exists in Windows when LDAP request buffer lengths are improperly calculated. In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a Domain Controller, aka "LDAP Elevation of Privilege Vulnerability." 
 | 
	[]  | null  | null  | 8.1 
							 | null  | null  | 
					|
	CVE-2024-5958 
 | 
	SQLi in Eliz Software's Panel 
 | 
	Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eliz Software Panel allows Command Line Execution through SQL Injection.This issue affects Panel: before v2.3.24. 
 | 
	[
  "cpe:2.3:a:eliz_software:panel:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:elizsoftware:panel:*:*:*:*:*:*:*:*"
]  | 9.4 
							 | null  | null  | null  | null  | 
					
	GHSA-47jj-pq3c-8pjm 
 | 
	Cross-site scripting (XSS) vulnerability in the GroupSpace application in BEA WebLogic Portal 9.2 GA allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to the rich text editor. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	CVE-2006-7232 
 | 
	sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY. 
 | 
	[
  "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
  "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
  "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
  "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"
]  | null  | null  | null  | 3.5 
							 | null  | 
					|
	GHSA-h398-9gxf-p5h5 
 | 
	Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	RHSA-2016:0711 
 | 
	Red Hat Security Advisory: jenkins security update 
 | 
	jenkins: Remote code execution vulnerability in remoting module (SECURITY-232) jenkins: HTTP response splitting vulnerability (SECURITY-238) jenkins: Non-constant time comparison of API token (SECURITY-241) jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245) jenkins: Remote code execution through remote API (SECURITY-247) 
 | 
	[
  "cpe:/a:redhat:openshift:3.1::el7"
]  | null  | null  | null  | null  | null  | 
					
	CVE-2018-0563 
 | 
	Untrusted search path vulnerability in the installer of FLET'S VIRUS CLEAR Easy Setup & Application Tool ver.13.0 and earlier versions and FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool ver.13.0 and earlier versions allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 
 | 
	[
  "cpe:2.3:a:ntt-east:flet\\'s_virus_clear_easy_setup_\\&_application_tool:*:*:*:*:*:*:*:*",
  "cpe:2.3:a:ntt-east:flet\\'s_virus_clear_v6_easy_setup_\\&_application_tool:*:*:*:*:*:*:*:*"
]  | null  | null  | 7.8 
							 | 9.3 
							 | null  | 
					|
	GHSA-36p3-3fj3-g9p5 
 | 
	SmartRobot from INTUMIT does not properly validate a specific page parameter, allowing unautheticated remote attackers to inject JavaScript code to the parameter for Reflected Cross-site Scripting attacks. 
 | 
	[]  | null  | 6.1 
							 | null  | null  | null  | 
					|
	CVE-2015-4036 
 | 
	Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call.  NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced. 
 | 
	[
  "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*",
  "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*"
]  | null  | null  | null  | 7.2 
							 | null  | 
					|
	GHSA-85p7-c3xf-w7xr 
 | 
	The add_doubles_metadata function in libavcodec/tiff.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via a negative or zero count value in a TIFF image, which triggers an out-of-bounds array access. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	CVE-2018-0909 
 | 
	Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0910, CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947. 
 | 
	[
  "cpe:2.3:a:microsoft:project_server:2013:sp1:*:*:*:*:*:*",
  "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*"
]  | null  | null  | 8.8 
							 | 6.5 
							 | null  | 
					|
	CVE-2019-25001 
 | 
	An issue was discovered in the serde_cbor crate before 0.10.2 for Rust. The CBOR deserializer can cause stack consumption via nested semantic tags. 
 | 
	[
  "cpe:2.3:a:serde_cbor_project:serde_cbor:*:*:*:*:*:*:*:*"
]  | null  | 7.5 
							 | null  | 5 
							 | null  | 
					|
	GHSA-x42c-gqrm-5gfv 
 | 
	Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-mhh7-wfh5-p77h 
 | 
	Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. 
 | 
	[]  | null  | null  | null  | null  | null  | 
					|
	GHSA-jh3f-r4h2-78qj 
 | 
	Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser<PMDEC>::read_hedge() e->set_prev(). 
 | 
	[]  | null  | 8.8 
							 | null  | null  | null  | 
					|
	CVE-2023-39382 
 | 
	 Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart. 
 | 
	[
  "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
  "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
]  | null  | 7.5 
							 | null  | null  | null  | 
					|
	CVE-2006-2545 
 | 
	Multiple cross-site scripting (XSS) vulnerabilities in Xtreme Topsites 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter in stats.php and (2) unspecified inputs in lostid.php, probably the searchthis parameter.  NOTE: one or more of these vectors might be resultant from SQL injection. 
 | 
	[
  "cpe:2.3:a:xtreme_scripts:xtreme_topsites:1.1:*:*:*:*:*:*:*"
]  | null  | null  | null  | 2.6 
							 | null  | 
					|
	GHSA-pf9g-5cwx-37fm 
 | 
	The Responsive Gallery Grid WordPress plugin before 2.3.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed 
 | 
	[]  | null  | 6.1 
							 | null  | null  | null  | 
					|
	ICSMA-22-298-01 
 | 
	AliveCor KardiaMobile 
 | 
	The smartphone application for the affected product is vulnerable to the publicly known Intent Manipulation exploit on Android phones. This exploit allows attackers to bypass app authentication and view or alter information in the app. The physical IoT device of the affected product has no encryption for its data-over-sound protocols. Exploiting this vulnerability could allow an attacker to read patient electrocardiography (EKG) results or create a denial-of-service condition by emitting sounds at similar frequencies as the device, disrupting the smartphone microphones ability to accurately read the data. To carry out this attack, the attacker must be close (less than 5 feet) to pick up and emit sound waves. 
 | 
	[]  | null  | null  | 4.8 
							 | null  | null  | 
					
	CVE-2024-12709 
 | 
	Bulk Me Now <= 2.0 - Message Deletion via CSRF 
 | 
	The Bulk Me Now! WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks. 
 | 
	[]  | null  | 4.3 
							 | null  | null  | null  | 
					
	cisco-sa-asaftd-ikev2-dos-9FgEyHsF 
 | 
	Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability 
 | 
	A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"]. 
 | 
	[]  | null  | 8.6 
							 | null  | null  | null  | 
					
	CVE-2017-8333 
 | 
	An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new routes to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in passing commands to a "popen" API in the function and thus result in command injection on the device. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "dest" is extracted at address 0x00420FC4. The POST parameter "dest is concatenated in a route add command and this is passed to a "popen" function at address 0x00421220. This allows an attacker to provide the payload of his/her choice and finally take control of the device. 
 | 
	[
  "cpe:2.3:o:securifi:almond_2015_firmware:al-r096:*:*:*:*:*:*:*",
  "cpe:2.3:h:securifi:almond_2015:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:securifi:almond\\+firmware:al-r096:*:*:*:*:*:*:*",
  "cpe:2.3:h:securifi:almond\\+:-:*:*:*:*:*:*:*",
  "cpe:2.3:o:securifi:almond_firmware:al-r096:*:*:*:*:*:*:*",
  "cpe:2.3:h:securifi:almond:-:*:*:*:*:*:*:*"
]  | null  | null  | 8.8 
							 | 9 
							 | null  | 
					|
	CVE-2023-42892 
 | 
	A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A local attacker may be able to elevate their privileges. 
 | 
	[
  "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]  | null  | 7.8 
							 | null  | null  | null  | 
					
			Subsets and Splits
				
	
				
			
				
No community queries yet
The top public SQL queries from the community will appear here once available.