id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2025-7131
|
Campcodes Payroll Management System ajax.php sql injection
|
A vulnerability was found in Campcodes Payroll Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=save_employee_attendance. The manipulation of the argument employee_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
GHSA-qr32-j4j6-3m7r
|
Command Injection in fs-git
|
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.RecommendationUpdate to version 1.0.2 or later.
|
[] | null | null | null | null | null |
CVE-2013-5996
|
Multiple cross-site scripting (XSS) vulnerabilities in shopping/payment.tpl components in LOCKON EC-CUBE 2.11.0 through 2.13.0 allow remote attackers to inject arbitrary web script or HTML via crafted values.
|
[
"cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-j4q4-qv6g-h5fv
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9
| null | null | null |
|
GHSA-wgp7-3rwh-vpgw
|
An attacker could send a malicious link to an authenticated operator, which may allow remote attackers to perform actions with the permissions of the user on the Sunny WebBox Firmware Version 1.6 and prior. This device uses IP addresses to maintain communication after a successful login, which would increase the ease of exploitation.
|
[] | null | 8.8
| null | null | null |
|
CVE-2022-33915
|
Versions of the Amazon AWS Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.3.5 are affected by a race condition that could lead to a local privilege escalation. This Hotpatch package is not a replacement for updating to a log4j version that mitigates CVE-2021-44228 or CVE-2021-45046; it provides a temporary mitigation to CVE-2021-44228 by hotpatching the local Java virtual machines. To do so, it iterates through all running Java processes, performs several checks, and executes the Java virtual machine with the same permissions and capabilities as the running process to load the hotpatch. A local user could cause the hotpatch script to execute a binary with elevated privileges by running a custom java process that performs exec() of an SUID binary after the hotpatch has observed the process path and before it has observed its effective user ID.
|
[
"cpe:2.3:a:amazon:hotpatch:*:*:*:*:*:log4j:*:*"
] | null | 7
| null | null | null |
|
GHSA-8wqc-vgv5-hpgj
|
Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.
|
[] | null | null | null | null | null |
|
CVE-2014-3596
|
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
|
[
"cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
GHSA-rf7m-8c9f-5c53
|
Multiple SQL injection vulnerabilities in sign.php in tinyguestbook allow remote attackers to execute arbitrary SQL commands via the (1) name and (2) msg parameters. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-vcgf-vmpc-ph79
|
Microweber Incorrect Permission Assignment for Critical Resource vulnerability
|
In Microweber prior to 1.2.11, a non-admin user is able to access other users' sensitive information.
|
[] | null | 6.5
| null | null | null |
CVE-2018-1000526
|
Openpsa contains a XML Injection vulnerability in RSS file upload feature that can result in Remote denial of service. This attack appear to be exploitable via Specially crafted XML file. This vulnerability appears to have been fixed in after commit 4974a26.
|
[
"cpe:2.3:a:openpsa2:openpsa:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
GHSA-642p-23g6-ph4w
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, tvOS 18.6, watchOS 11.6, visionOS 2.6. Processing maliciously crafted web content may lead to an unexpected Safari crash.
|
[] | null | 6.5
| null | null | null |
|
CVE-2023-7018
|
Deserialization of Untrusted Data in huggingface/transformers
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.
|
[
"cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*"
] | null | null | 9.6
| null | null |
CVE-2023-2386
|
Netgear SRX5308 Web Management Interface cross site scripting
|
A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.toAddr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] | null | 2.4
| 2.4
| 3.3
| null |
CVE-2001-0753
|
Cisco CBOS 2.3.8 and earlier stores the passwords for (1) exec and (2) enable in cleartext in the NVRAM and a configuration file, which could allow unauthorized users to obtain the passwords and gain privileges.
|
[
"cpe:2.3:o:cisco:cbos:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2004-0013
|
jabber 1.4.2, 1.4.2a, and possibly earlier versions, does not properly handle SSL connections, which allows remote attackers to cause a denial of service (crash).
|
[
"cpe:2.3:a:jabber_software_foundation:jabber_server:1.4.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:jabber_software_foundation:jabber_server:1.4.3:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
RHSA-2025:0714
|
Red Hat Security Advisory: rsync security update
|
rsync: Info Leak via Uninitialized Stack Contents
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5
| null | null | null |
GHSA-97x2-vjfg-fjhm
|
An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. This is due to the usage of the callback wp_ajax_nopriv function in Includes/Total-Soft-Poll-Ajax.php for sensitive operations.
|
[] | null | null | null | null | null |
|
GHSA-8q5x-76jx-443h
|
Vulnerability in the Oracle Solaris product of Oracle Systems (component: LDAP Library). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.0 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L).
|
[] | null | 1.8
| null | null | null |
|
GHSA-5ghg-233h-7j79
|
PyDio Stored XSS Vulnerability
|
A stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript code and afterwards a file preview URL can be used to access the uploaded file. If a malicious user shares an uploaded HTML file containing JavaScript code with another user of the application, and tricks an authenticated victim into accessing a URL that results in the HTML code being interpreted by the web browser, then the included JavaScript code is executed under the context of the victim user session.
|
[] | null | null | 5.4
| null | null |
GHSA-vh7x-8rfm-rpf4
|
Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.
|
[] | null | 7.5
| null | null | null |
|
GHSA-qc4p-7g72-jqrq
|
An uninitialized memory use vulnerability exists in Tinyproxy 1.11.1 while parsing HTTP requests. In certain configurations, a specially crafted HTTP request can result in disclosure of data allocated on the heap, which could contain sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
|
[] | null | 5.9
| null | null | null |
|
CVE-2023-40667
|
WordPress Simple URLs Plugin <= 117 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lasso Simple URLs plugin <= 117 versions.
|
[
"cpe:2.3:a:getlasso:simple_urls:*:*:*:*:*:wordpress:*:*"
] | null | 7.1
| null | null | null |
GHSA-9vh5-qcwf-6gp4
|
An improper input validation vulnerability in the Schweitzer Engineering Laboratories SEL-411L could allow a malicious actor to manipulate authorized users to click on a link that could allow undesired behavior.See product Instruction Manual Appendix A dated 20230830 for more details.
|
[] | null | 4
| null | null | null |
|
CVE-2024-11077
|
code-projects Job Recruitment index.php sql injection
|
A vulnerability, which was classified as critical, was found in code-projects Job Recruitment 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*"
] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2021-23877
|
McAfee Total Protection (MTP) - Privilege Escalation vulnerability
|
Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP.
|
[
"cpe:2.3:a:mcafee:total_protection:*:*:*:*:free_trial:*:*:*"
] | null | 6.7
| null | null | null |
CVE-2009-0631
|
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet.
|
[
"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ira:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2see:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sef:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2seg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2srd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ste:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xna:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*"
] | null | null | null | 7.8
| null |
|
GHSA-pvrf-2wf8-jrqv
|
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
|
[] | null | 7.8
| null | null | null |
|
CVE-2017-15409
|
Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.8
| null |
|
GHSA-7qw5-pqhc-xm4g
|
Users with SCRIPT right can execute arbitrary code in XWiki
|
ImpactAny user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.PatchesIt has been patched in both version XWiki 12.2.1 and XWiki 11.10.5.WorkaroundsThe only workaround is to give SCRIPT right only to trusted users.Referenceshttps://jira.xwiki.org/browse/XWIKI-17141
https://jira.xwiki.org/browse/XWIKI-17266It's been reported by the GitHub Security Lab under #GHSL-2020-046.For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki](https://jira.xwiki.org)Email us at [our security mailing list](mailto:[email protected])
|
[] | null | 6.6
| null | null | null |
GHSA-w4pv-w56c-mg4v
|
Path Traversal in stattic
|
Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`.RecommendationUpdate to version 0.3.0 or later.
|
[] | null | 7.5
| null | null | null |
GHSA-2r9r-3596-47c9
|
Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Management Specs). The supported version that is affected is 12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | 8.1
| null | null | null |
|
CVE-2000-0764
|
Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed IP packet.
|
[
"cpe:2.3:h:intel:express_8100:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-229f-pm83-vmf3
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Likert Survey Master likert-survey-master allows Reflected XSS.This issue affects Likert Survey Master: from n/a through <= 0.8.0.1.
|
[] | null | 7.1
| null | null | null |
|
GHSA-7pf2-qwx3-5fmv
|
Multiple cross-site scripting (XSS) vulnerabilities in MyBB (aka MyBulletinBoard) 1.8.x before 1.8.2 allow remote attackers to inject arbitrary web script or HTML via the (1) type parameter to report.php, (2) signature parameter in a do_editsig action to usercp.php, or (3) title parameter in the style-templates module in an edit_template action or (4) file parameter in the config-languages module in an edit action to admin/index.php.
|
[] | null | null | null | null | null |
|
CVE-2023-48505
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
GHSA-hhvc-3rm5-x4m2
|
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 3.2.3 on HP-UX B.11.23, and before 3.2.8 on HP-UX B.11.31, allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2014-7122
|
The Lansing State Journal Print (aka com.lansingjournal.android.prod) application 6.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:gannett:lansing_state_journal_print:6.7:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-33qw-xh9j-v5v3
|
Cross Site Scripting (XSS) vulnerability in sourcecodester Multi Restaurant Table Reservation System 1.0 via the Table Name field to /dashboard/table-list.php.
|
[] | null | 5.4
| null | null | null |
|
CVE-2022-0221
|
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could result in information disclosure when opening a malicious solution file provided by an attacker with SCADAPack Workbench. This could be exploited to pass data from local files to a remote system controlled by an attacker. Affected Product: SCADAPack Workbench (6.6.8a and prior)
|
[
"cpe:2.3:a:schneider-electric:scadapack_workbench:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
|
RHSA-2025:10459
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.8 Security update
|
org.jboss.eap:wildfly-ejb3: Improper Deserialization in JBoss Marshalling Allows Remote Code Execution org.jboss.hal-hal-parent: Stored Cross-Site Scripting (XSS) in JBoss EAP Management Console org.apache.cxf: Apache CXF: Denial of Service vulnerability with temporary files base-x: base-x homograph attack allows Unicode lookalike characters to bypass validation. commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
] | null | 8.8
| null | null | null |
CVE-2025-30346
|
Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.
|
[] | null | 5.4
| null | null | null |
|
GHSA-qhgf-332f-8jqf
|
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | 4.8
| null | null | null |
|
RHSA-2024:1982
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5
| null | null | null |
CVE-2023-38050
|
A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} in EasyAppointments < 1.5.0
|
A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
|
[
"cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:*:*:*"
] | null | 9.1
| null | null | null |
GHSA-fchg-vp85-h7h9
|
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function parse_metadata() located in abc.c. It allows an attacker to cause Denial of Service.
|
[] | null | null | null | null | null |
|
GHSA-77h7-8788-mfv3
|
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to a Denial of Service.
|
[] | null | 6.5
| null | null | null |
|
GHSA-hx37-57m6-7957
|
PHP remote file inclusion vulnerability in utils/class_HTTPRetriever.php in phpSearch allows remote attackers to execute arbitrary PHP code via a URL in the libcurlemuinc parameter.
|
[] | null | null | null | null | null |
|
GHSA-r8gc-4gr6-4vf3
|
The default configuration of the <Button2> binding in Uzbl before 2010.08.05 does not properly use the @SELECTED_URI feature, which allows user-assisted remote attackers to execute arbitrary commands via a crafted HREF attribute of an A element in an HTML document.
|
[] | null | null | null | null | null |
|
GHSA-6ggh-94v9-v52c
|
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
|
[] | null | 8.4
| null | null | null |
|
CVE-2017-7940
|
The iw_read_gif_file function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to consume an amount of available memory via a crafted file.
|
[
"cpe:2.3:a:entropymine:imageworsener:1.3.0:*:*:*:*:*:*:*"
] | null | null | 5.5
| 4.3
| null |
|
CVE-2019-4295
|
IBM Robotic Process Automation with Automation Anywhere 11 could allow an attacker with specialized access to obtain highly sensitive from the credential vault. IBM X-Force ID: 160758.
|
[
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 4.9
| null | null |
|
CVE-2022-36492
|
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function AddMacList.
|
[
"cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
GHSA-5gx5-pfq3-g683
|
Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[] | null | null | 6.8
| null | null |
|
CVE-2023-52640
|
fs/ntfs3: Fix oob in ntfs_listxattr
|
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix oob in ntfs_listxattr
The length of name cannot exceed the space occupied by ea.
|
[] | null | 7.1
| null | null | null |
CVE-2007-1703
|
SQL injection vulnerability in index.php in the RWCards (com_rwcards) 2.4.3 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter.
|
[
"cpe:2.3:a:joomla:rwcards_component:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2025-59713
|
Snipe-IT before 8.1.18 allows unsafe deserialization.
|
[] | null | 6.8
| null | null | null |
|
GHSA-7vcc-w55c-2r5p
|
Untrusted search path vulnerability in JetAudio 8.0.7.1000 Basic allows local users to gain privileges via a Trojan horse WNASPI32.DLL file in the current working directory, as demonstrated by a directory that contains a .mp3 file. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2008-1005
|
WebCore, as used in Apple Safari before 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate attackers to read the password.
|
[
"cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*"
] | null | null | null | 2.1
| null |
|
GHSA-r4r4-cp78-rh67
|
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8.
|
[] | null | null | null | null | null |
|
GHSA-f8cc-p734-ww7f
|
Password exposure in Cognito Software Moneyworks 8.0.3 and earlier allows attackers to gain administrator access to all data, because verbose logging writes the administrator password to a world-readable file.
|
[] | null | null | 9.8
| null | null |
|
CVE-2018-12158
|
Insufficient input validation in BIOS update utility in Intel NUC FW kits downloaded before May 24, 2018 may allow a privileged user to potentially trigger a denial of service or information disclosure via local access.
|
[
"cpe:2.3:o:intel:next_unit_of_computing_firmware:*:*:*:*:*:*:*:*"
] | null | null | 6
| 5.6
| null |
|
CVE-2010-3415
|
Google Chrome before 6.0.472.59 does not properly implement Geolocation, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-68g3-xvmv-w62w
|
Insufficient control flow management for some Intel(R) Xeon Processors may allow an authenticated user to potentially enable denial of service via local access.
|
[] | 6.8
| 6.5
| null | null | null |
|
RHSA-2025:0903
|
Red Hat Security Advisory: libsoup security update
|
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 9
| null | null | null |
CVE-2006-1047
|
Unspecified vulnerability in the "Remember Me login functionality" in Joomla! 1.0.7 and earlier has unknown impact and attack vectors.
|
[
"cpe:2.3:a:joomla:joomla:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.7:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-h935-95pr-wqf9
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3290.
|
[] | null | null | 7.5
| null | null |
|
CVE-2009-1447
|
Unrestricted file upload vulnerability in admin/editor/image.php in e-cart.biz Free Shopping Cart allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images/.
|
[
"cpe:2.3:a:e-cart:free_shopping_cart:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2023-51446
|
GLPI LDAP Injection during authentication
|
GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12.
|
[
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 5.9
| null | null | null |
CVE-2025-40776
|
Birthday Attack against Resolvers supporting ECS
|
A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack.
This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1, and 9.20.9-S1 through 9.20.10-S1.
|
[] | null | 8.6
| null | null | null |
CVE-2010-1053
|
Multiple SQL injection vulnerabilities in Zen Time Tracking 2.2 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters to (a) userlogin.php and (b) managerlogin.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:zentracking:zen_time_tracking:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2024-8694
|
JFinalCMS com.cms.controller.admin.TemplateController update path traversal
|
A vulnerability, which was classified as problematic, was found in JFinalCMS up to 20240903. This affects the function update of the file /admin/template/update of the component com.cms.controller.admin.TemplateController. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:jfinalcms_project:jfinalcms:*:*:*:*:*:*:*:*"
] | 5.1
| 3.8
| 3.8
| 4.7
| null |
GHSA-fjgf-2jpq-hrjf
|
LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer.
|
[] | null | null | null | null | null |
|
CVE-2006-0757
|
Multiple eval injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary PHP code via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts, as demonstrated by an addressbook.update.php request with a contactgroupid value of phpinfo() preceded by facilitators.
|
[
"cpe:2.3:a:hivemail:hivemail:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.2.1_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.2.1_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.2_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.3_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:hivemail:hivemail:1.3_rc1:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2020-2608
|
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Repository). Supported versions that are affected are 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
|
[
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*"
] | null | null | 6
| null | null |
|
CVE-2020-17506
|
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
|
[
"cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
CVE-2018-0692
|
Untrusted search path vulnerability in Baidu Browser Version 43.23.1000.500 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:baidu:spark_browser:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 9.3
| null |
|
RHSA-2014:1920
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update
|
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | null | null | null |
GHSA-gc9f-rwq2-6pg3
|
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7
| null | null | null |
|
CVE-2024-7335
|
TOTOLINK EX200 getSaveConfig buffer overflow
|
A vulnerability classified as critical has been found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected is the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*"
] | 8.7
| 8.8
| 8.8
| 9
| null |
GHSA-m4cc-hx9x-r2qr
|
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5096 and CVE-2015-5105.
|
[] | null | null | null | null | null |
|
CVE-2025-29484
|
An out-of-memory error in the parseABC_NS_SET_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion.
|
[] | null | 7.5
| null | null | null |
|
CVE-2021-43016
|
Adobe InCopy NULL Pointer Dereference Application Denial of Service
|
Adobe InCopy version 16.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
CVE-2024-4042
|
Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel - Combo Blocks <= 2.2.80 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Attribute
|
The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the menu-wrap-item block in all versions up to, and including, 2.2.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:pickplugins:comboblocks:*:*:*:*:*:wordpress:*:*"
] | null | 6.4
| null | null | null |
CVE-2024-57844
|
drm/xe: Fix fault on fd close after unbind
|
In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Fix fault on fd close after unbind
If userspace holds an fd open, unbinds the device and then closes it,
the driver shouldn't try to access the hardware. Protect it by using
drm_dev_enter()/drm_dev_exit(). This fixes the following page fault:
<6> [IGT] xe_wedged: exiting, ret=98
<1> BUG: unable to handle page fault for address: ffffc901bc5e508c
<1> #PF: supervisor read access in kernel mode
<1> #PF: error_code(0x0000) - not-present page
...
<4> xe_lrc_update_timestamp+0x1c/0xd0 [xe]
<4> xe_exec_queue_update_run_ticks+0x50/0xb0 [xe]
<4> xe_exec_queue_fini+0x16/0xb0 [xe]
<4> __guc_exec_queue_fini_async+0xc4/0x190 [xe]
<4> guc_exec_queue_fini_async+0xa0/0xe0 [xe]
<4> guc_exec_queue_fini+0x23/0x40 [xe]
<4> xe_exec_queue_destroy+0xb3/0xf0 [xe]
<4> xe_file_close+0xd4/0x1a0 [xe]
<4> drm_file_free+0x210/0x280 [drm]
<4> drm_close_helper.isra.0+0x6d/0x80 [drm]
<4> drm_release_noglobal+0x20/0x90 [drm]
(cherry picked from commit 4ca1fd418338d4d135428a0eb1e16e3b3ce17ee8)
|
[] | null | 5.5
| null | null | null |
GHSA-99qr-9cc9-fv2x
|
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
|
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
|
[] | null | null | 7.8
| null | null |
RHSA-2024:3560
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update
|
datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.4
| null | null | null |
CVE-2004-2244
|
The XML parser in Oracle 9i Application Server Release 2 9.0.3.0 and 9.0.3.1, 9.0.2.3 and earlier, and Release 1 1.0.2.2 and 1.0.2.2.2, and Database Server Release 2 9.2.0.1 and later, allows remote attackers to cause a denial of service (CPU and memory consumption) via a SOAP message containing a crafted DTD.
|
[
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-mpqr-xh68-rm34
|
Parameter AttFilterValue in ednareporting.asmx is vulnerable to unauthenticated SQL injection attacks. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. An attacker can send unauthenticated HTTP requests to trigger this vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2023-25838
|
BUG-000157278 – ArcGIS Insights has a security vulnerability.
|
There is SQL injection vulnerability in Esri ArcGIS Insights 2022.1 for ArcGIS Enterprise and that may allow a remote, authorized attacker to execute arbitrary SQL commands against the back-end database. The effort required to generate the crafted input required to exploit this issue is complex and requires significant effort before a successful attack can be expected.
|
[
"cpe:2.3:a:esri:arcgis_insights:2022.1:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
CVE-2022-42522
|
In DoSetCarrierConfig of miscservice.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130038References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 4.4
| null | null | null |
|
RHSA-2003:030
|
Red Hat Security Advisory: lynx security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null | null |
GHSA-j3cm-5453-m956
|
Cavok – CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
[] | null | 9.8
| null | null | null |
|
CVE-2003-0812
|
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2022-21281
|
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:primavera_portfolio_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_portfolio_management:20.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_portfolio_management:20.0.0.1:*:*:*:*:*:*:*"
] | null | 4.8
| null | null | null |
|
CVE-2018-12359
|
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:52.9.1:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.8
| null |
|
CVE-2025-53821
|
WeGIA vulnerable to Open Redirect in endpoint 'control.php' parameter 'nextPage'
|
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. An Open Redirect vulnerability exists in the web application prior to version 3.4.5. The control.php endpoint allows to specify an arbitrary URL via the `nextPage` parameter, leading to an uncontrolled redirection. Version 3.4.5 contains a fix for the issue.
|
[] | null | 4.7
| null | null | null |
CVE-2010-5275
|
Cross-site scripting (XSS) vulnerability in memcache_admin in the Memcache module 5.x before 5.x-1.10 and 6.x before 6.x-1.6 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:memcache_project:memcache:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.0:deprecated:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:5.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:memcache_project:memcache:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-v538-h8wg-rjxf
|
CastleNet CBV38Z4EC 125.553mp1.39219mp1.899.007, CBV38Z4ECNIT 125.553mp1.39219mp1.899.005ITT, CBW383G4J 37.556mp5.008, and CBW38G4J 37.553mp1.008 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
|
[] | null | null | 9.8
| null | null |
|
CVE-2010-4533
|
offlineimap before 6.3.4 added support for SSL server certificate validation but it is still possible to use SSL v2 protocol, which is a flawed protocol with multiple security deficiencies.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:offlineimap:offlineimap:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.