id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2014-9800
Integer overflow in lib/heap/heap.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28822150 and Qualcomm internal bug CR692478.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-pwr9-jmgc-9j48
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36993291.
[]
null
null
5.5
null
null
GHSA-2p95-qr38-wg9f
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.
[]
null
null
9.9
null
null
GHSA-96w8-f5p6-mqmw
Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.
[]
null
null
null
null
null
RHSA-2024:5519
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 security update
kernel: net: kernel: UAF in network route management
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.8
null
null
null
GHSA-hfg2-wf6j-x53p
SQLAlchemy vulnerable to SQL injection
Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.
[]
9.3
9.8
null
null
null
GHSA-5hp8-35wj-m525
Uncontrolled recursion in ammonia
An issue was discovered in the ammonia crate before 2.1.0 for Rust. There is uncontrolled recursion during HTML DOM tree serialization.
[]
null
null
7.5
null
null
CVE-2019-16018
Cisco IOS XR Software EVPN Operational Routes Denial of Service Vulnerability
A vulnerability in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of a BGP update message that contains crafted EVPN attributes. An attacker could indirectly exploit the vulnerability by sending BGP EVPN update messages with a specific, malformed attribute to an affected system and waiting for a user on the device to display the EVPN operational routes’ status. If successful, the attacker could cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
[ "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:x64:*", "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:crs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:xrv_9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_540l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_1001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_1002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_1004:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*" ]
null
null
7.4
null
null
GHSA-c5gw-57vh-36mj
Cross-site scripting (XSS) vulnerability in the web management interface in F5 BIG-IP 9.4.3 allows remote attackers to inject arbitrary web script or HTML via (1) the name of a node object, or the (2) sysContact or (3) sysLocation SNMP configuration field, aka "Audit Log XSS." NOTE: these issues might be resultant from cross-site request forgery (CSRF) vulnerabilities.
[]
null
null
null
null
null
RHSA-2021:0289
Red Hat Security Advisory: firefox security update
Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
null
GHSA-q5jf-fjpf-mq77
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.7.0 and 12.1.2.0 allows remote authenticated users to affect confidentiality via vectors related to plugin 1.1.
[]
null
null
null
null
null
GHSA-jcph-jfm7-9jg7
Rejected reason: Not used
[]
null
null
null
null
null
CVE-2021-37548
In JetBrains TeamCity before 2021.1, passwords in cleartext sometimes could be stored in VCS.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2025-26688
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
CVE-2025-24813
Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
[]
null
9.8
null
null
null
GHSA-h2r9-q8w8-hpcr
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
[]
null
null
4.3
null
null
GHSA-7m8c-9m95-h39f
IBM OpenPages with Watson 8.3 and 9.0 may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature.
[]
null
5.3
null
null
null
GHSA-xmpq-x22f-7jg3
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
[]
null
8.8
null
null
null
CVE-2006-3419
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
[ "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-q9jx-r63x-g7f5
vqSoft vqServer stores sensitive information such as passwords in cleartext in the server.cfg file, which allows attackers to gain privileges.
[]
null
null
null
null
null
CVE-2015-9229
In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter.
[ "cpe:2.3:a:imagely:nextgen_gallery:2.1.15:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
null
CVE-2023-46765
Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-pr7g-498h-frwf
In the Linux kernel, the following vulnerability has been resolved:ALSA: seq: oss: Fix races at processing SysEx messagesOSS sequencer handles the SysEx messages split in 6 bytes packets, and ALSA sequencer OSS layer tries to combine those. It stores the data in the internal buffer and this access is racy as of now, which may lead to the out-of-bounds access.As a temporary band-aid fix, introduce a mutex for serializing the process of the SysEx message packets.
[]
null
null
null
null
null
CVE-2011-1015
The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
[ "cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-49704
A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The Generic Data Mapper, the Engineering Adapter, and the Engineering Interface improperly handle XML External Entity (XXE) entries when parsing configuration and mapping files. This could allow an attacker to extract any file with a known location on the user's system or accessible network folders by persuading a user to use a maliciously crafted configuration or mapping file in one of the affected components.
[]
5.7
5.5
null
null
null
CVE-2020-10207
Use of Hard-coded Credentials in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows remote attackers to retrieve and modify the device settings.
[ "cpe:2.3:o:amino:ak45x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:ak45x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:ak5xx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:ak5xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:ak65x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:ak65x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:aria6xx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:aria6xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:aria7xx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:aria7xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:kami7b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:kami7b:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-49250
WordPress Table of Contents Plus plugin <= 2408 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Michael Tran Table of Contents Plus allows Cross Site Request Forgery.This issue affects Table of Contents Plus: from n/a through 2408.
[ "cpe:2.3:a:dublue:table_of_contents_plus:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-q986-4c56-gm92
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8636, and CVE-2015-8645.
[]
null
null
8.8
null
null
RHSA-2024:4427
Red Hat Security Advisory: fence-agents security update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::highavailability", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage" ]
null
5.4
null
null
null
CVE-2023-33099
Improper Input Validation in Multi-Mode Call Processor
Transient DOS while processing SMS container of non-standard size received in DL NAS transport in NR.
[ "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_782g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_855_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_855_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_860_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_860_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
ICSA-14-079-02
Siemens SIMATIC S7-1200 Vulnerabilities
Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets, a different vulnerability than CVE-2014-2259. The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors, a different vulnerability than CVE-2014-2251. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted PROFINET packets, a different vulnerability than CVE-2014-2253. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets, a different vulnerability than CVE-2014-2255. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets, a different vulnerability than CVE-2014-2257.
[]
null
null
null
null
null
CVE-2006-0119
Multiple unspecified vulnerabilities in IBM Lotus Notes and Domino Server before 6.5.5 have unknown impact and attack vectors, due to "potential security issues" as identified by SPR numbers (1) GPKS6C9J67 in Agents, (2) JGAN6B6TZ3 and (3) KSPR699NBP in the Router, (4) GPKS5YQGPT in Security, or (5) HSAO6BNL6Y in the Web Server. NOTE: vector 3 is related to an issue in NROUTER in IBM Lotus Notes and Domino Server before 6.5.4 FP1, 6.5.5, and 7.0, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted vCal meeting request sent via SMTP (aka SPR# KSPR699NBP).
[ "cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp1:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp2:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-w7qc-8c3p-gg37
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exnet Informatics Software Ferry Reservation System allows Reflected XSS.This issue affects Ferry Reservation System: before 240805-002.
[]
8.8
null
null
null
null
GHSA-8h44-39jg-7c5x
Schneider Electric StruxureWare Building Expert MPM before 2.15 does not use encryption for the client-server data stream, which allows remote attackers to discover credentials by sniffing the network.
[]
null
null
null
null
null
CVE-2024-48734
Unrestricted file upload in /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} in SAS Studio 9.4 allows remote attacker to upload malicious files. NOTE: this is disputed by the vendor because file upload is allowed for authorized users.
[ "cpe:2.3:a:sas:studio:9.4:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2022-49722
ice: Fix memory corruption in VF driver
In the Linux kernel, the following vulnerability has been resolved: ice: Fix memory corruption in VF driver Disable VF's RX/TX queues, when it's disabled. VF can have queues enabled, when it requests a reset. If PF driver assumes that VF is disabled, while VF still has queues configured, VF may unmap DMA resources. In such scenario device still can map packets to memory, which ends up silently corrupting it. Previously, VF driver could experience memory corruption, which lead to crash: [ 5119.170157] BUG: unable to handle kernel paging request at 00001b9780003237 [ 5119.170166] PGD 0 P4D 0 [ 5119.170173] Oops: 0002 [#1] PREEMPT_RT SMP PTI [ 5119.170181] CPU: 30 PID: 427592 Comm: kworker/u96:2 Kdump: loaded Tainted: G W I --------- - - 4.18.0-372.9.1.rt7.166.el8.x86_64 #1 [ 5119.170189] Hardware name: Dell Inc. PowerEdge R740/014X06, BIOS 2.3.10 08/15/2019 [ 5119.170193] Workqueue: iavf iavf_adminq_task [iavf] [ 5119.170219] RIP: 0010:__page_frag_cache_drain+0x5/0x30 [ 5119.170238] Code: 0f 0f b6 77 51 85 f6 74 07 31 d2 e9 05 df ff ff e9 90 fe ff ff 48 8b 05 49 db 33 01 eb b4 0f 1f 80 00 00 00 00 0f 1f 44 00 00 <f0> 29 77 34 74 01 c3 48 8b 07 f6 c4 80 74 0f 0f b6 77 51 85 f6 74 [ 5119.170244] RSP: 0018:ffffa43b0bdcfd78 EFLAGS: 00010282 [ 5119.170250] RAX: ffffffff896b3e40 RBX: ffff8fb282524000 RCX: 0000000000000002 [ 5119.170254] RDX: 0000000049000000 RSI: 0000000000000000 RDI: 00001b9780003203 [ 5119.170259] RBP: ffff8fb248217b00 R08: 0000000000000022 R09: 0000000000000009 [ 5119.170262] R10: 2b849d6300000000 R11: 0000000000000020 R12: 0000000000000000 [ 5119.170265] R13: 0000000000001000 R14: 0000000000000009 R15: 0000000000000000 [ 5119.170269] FS: 0000000000000000(0000) GS:ffff8fb1201c0000(0000) knlGS:0000000000000000 [ 5119.170274] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 5119.170279] CR2: 00001b9780003237 CR3: 00000008f3e1a003 CR4: 00000000007726e0 [ 5119.170283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 5119.170286] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 5119.170290] PKRU: 55555554 [ 5119.170292] Call Trace: [ 5119.170298] iavf_clean_rx_ring+0xad/0x110 [iavf] [ 5119.170324] iavf_free_rx_resources+0xe/0x50 [iavf] [ 5119.170342] iavf_free_all_rx_resources.part.51+0x30/0x40 [iavf] [ 5119.170358] iavf_virtchnl_completion+0xd8a/0x15b0 [iavf] [ 5119.170377] ? iavf_clean_arq_element+0x210/0x280 [iavf] [ 5119.170397] iavf_adminq_task+0x126/0x2e0 [iavf] [ 5119.170416] process_one_work+0x18f/0x420 [ 5119.170429] worker_thread+0x30/0x370 [ 5119.170437] ? process_one_work+0x420/0x420 [ 5119.170445] kthread+0x151/0x170 [ 5119.170452] ? set_kthread_struct+0x40/0x40 [ 5119.170460] ret_from_fork+0x35/0x40 [ 5119.170477] Modules linked in: iavf sctp ip6_udp_tunnel udp_tunnel mlx4_en mlx4_core nfp tls vhost_net vhost vhost_iotlb tap tun xt_CHECKSUM ipt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache sunrpc intel_rapl_msr iTCO_wdt iTCO_vendor_support dell_smbios wmi_bmof dell_wmi_descriptor dcdbas kvm_intel kvm irqbypass intel_rapl_common isst_if_common skx_edac irdma nfit libnvdimm x86_pkg_temp_thermal i40e intel_powerclamp coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel ib_uverbs rapl ipmi_ssif intel_cstate intel_uncore mei_me pcspkr acpi_ipmi ib_core mei lpc_ich i2c_i801 ipmi_si ipmi_devintf wmi ipmi_msghandler acpi_power_meter xfs libcrc32c sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ice ahci drm libahci crc32c_intel libata tg3 megaraid_sas [ 5119.170613] i2c_algo_bit dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: iavf] [ 5119.170627] CR2: 00001b9780003237
[]
null
null
null
null
null
CVE-2001-1070
Sage Software MAS 200 allows remote attackers to cause a denial of service by connecting to port 10000 and entering a series of control characters.
[ "cpe:2.3:a:sage_software:mas_200:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2009-4335
Multiple unspecified vulnerabilities in bundled stored procedures in the Spatial Extender component in IBM DB2 9.5 before FP5 have unknown impact and remote attack vectors, related to "remote exploits."
[ "cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp4:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp4a:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2008-2568
SQL injection vulnerability in the Simple Shop Galore (com_simpleshop) component 3.4 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a browse action to index.php.
[ "cpe:2.3:a:joomla:com_simpleshop:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-xrf9-3q75-637f
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731
[]
null
9.8
null
null
null
CVE-2023-42102
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-20409.
[ "cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2024-46555
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the pb parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ "cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-wwmp-583h-v424
Mitake smart stock selection system contains a broken authentication vulnerability. By manipulating the parameters in the URL, remote attackers can gain the privileged permissions to access transaction record, and fraudulent trading without login.
[]
null
null
null
null
null
GHSA-xw74-7c4m-397f
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18658.
[]
null
5.5
null
null
null
GHSA-84qq-m3p7-pqjh
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. An out-of-bounds read vulnerability may be exploited by processing specially crafted project files, which may allow an attacker to read information.
[]
null
5.5
null
null
null
GHSA-3wjh-qhxw-f3h6
Simple Machines Forum (SMF) 2.0.4 allows local file inclusion, with resultant remote code execution, in install.php via ../ directory traversal in the db_type parameter if install.php remains present after installation.
[]
null
null
8.8
null
null
GHSA-jfph-3485-2gcv
Vulnerability in Drupal Panelizer (obsolete).This issue affects Panelizer (obsolete): *.*.
[]
null
5.9
null
null
null
GHSA-37g9-8cjr-x358
Resource leakage issue during dci client registration due to reference count is not decremented if dci client registration fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
null
null
null
null
null
CVE-2020-10082
GitLab 12.2 through 12.8.1 allows Denial of Service. A denial of service vulnerability impacting the designs for public issues was discovered.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5.3
null
5
null
GHSA-79qc-cqh8-5jjg
In PVRSRVBridgeDevicememHistorySparseChange of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270399633
[]
null
7.8
null
null
null
CVE-2021-31426
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.2-49151. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Tools component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel on the target guest system. Was ZDI-CAN-12791.
[ "cpe:2.3:a:parallels:parallels_desktop:16.1.2-49151:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2025-29040
An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c
[]
null
9.8
null
null
null
GHSA-hwwv-phfq-243p
In the Linux kernel, the following vulnerability has been resolved:perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freqCurrently, using PEBS-via-PT with a sample frequency instead of a sample period, causes a segfault. For example:That happens because intel_pmu_pebs_event_update_no_drain() assumes all the pebs_enabled bits represent counter indexes, which is not always the case. In this particular case, bits 60 and 61 are set for PEBS-via-PT purposes.The behaviour of PEBS-via-PT with sample frequency is questionable because although a PMI is generated (PEBS_PMI_AFTER_EACH_RECORD), the period is not adjusted anyway.Putting that aside, fix intel_pmu_pebs_event_update_no_drain() by passing the mask of counter bits instead of 'size'. Note, prior to the Fixes commit, 'size' would be limited to the maximum counter index, so the issue was not hit.
[]
null
null
null
null
null
CVE-2025-50058
Extension - rsjoomla.com - Stored XSS vulnerability in RSDirectory! component 1.16.3-1.17.7 for Joomla
A stored XSS vulnerability in the RSDirectory! component 1.0.0-2.2.8 Joomla was discovered. The issue allows remote authenticated attackers to inject arbitrary web script or HTML via the review reply component.
[]
5.1
null
null
null
null
GHSA-cp6v-m93c-8q82
Dell SupportAssist Client Consumer versions (3.11.0 and versions prior) and Dell SupportAssist Client Commercial versions (3.2.0 and versions prior) contain a privilege escalation vulnerability. A non-admin user can exploit the vulnerability and gain admin access to the system.
[]
null
7.8
null
null
null
GHSA-rfm2-f94j-qhjp
OpenStack Storlets arbitrary code execution vulnerability
An issue in OpenStack Storlets yoga-eom allows a remote attacker to execute arbitrary code via the gateway.py component.
[]
null
7.8
null
null
null
CVE-2016-1000005
mcrypt_get_block_size did not enforce that the provided "module" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
[ "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
RHSA-2023:0810
Red Hat Security Advisory: firefox security update
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
null
CVE-2015-1292
The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2019-8277
UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
[ "cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinumerik_access_mymachine\\/p2p:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\\/ipc:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\\/ipc:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-6r8r-mxw7-gj29
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Primary Addon for Elementor allows Stored XSS.This issue affects Primary Addon for Elementor: from n/a through 1.5.8.
[]
null
6.5
null
null
null
CVE-2023-42838
An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.1, macOS Monterey 12.7.2. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
GHSA-whx7-jg3x-m7fw
In the Linux kernel, the following vulnerability has been resolved:KVM: VMX: Reset eVMCS controls in VP assist page during hardware disablingReset the eVMCS controls in the per-CPU VP assist page during hardware disabling instead of waiting until kvm-intel's module exit. The controls are activated if and only if KVM creates a VM, i.e. don't need to be reset if hardware is never enabled.Doing the reset during hardware disabling will naturally fix a potential NULL pointer deref bug once KVM disables CPU hotplug while enabling and disabling hardware (which is necessary to fix a variety of bugs). If the kernel is running as the root partition, the VP assist page is unmapped during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to write to a CPU's VP assist page after it's unmapped.
[]
null
null
null
null
null
CVE-2022-4728
Graphite Web Cookie cross site scripting
A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:graphite_project:graphite:-:*:*:*:*:*:*:*" ]
null
3.5
null
null
null
GHSA-37p4-269j-q6r9
SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php.
[]
null
6.5
null
null
null
GHSA-h728-7p3p-f89q
In the Linux kernel, the following vulnerability has been resolved:PCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains()of_get_child_by_name() returns a node pointer with refcount incremented, so we should use of_node_put() on it when we don't need it anymore.Add missing of_node_put() to avoid refcount leak.
[]
null
null
null
null
null
GHSA-xjph-r444-9j84
Incorrect Default Permissions vulnerability in Hitachi Storage Provider for VMware vCenter allows local users to read and write specific files.This issue affects Hitachi Storage Provider for VMware vCenter: from 3.1.0 before 3.7.4.
[]
null
4.4
null
null
null
CVE-2023-41060
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. A remote user may be able to cause kernel code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2021-22962
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*" ]
null
null
7.3
null
null
CVE-2013-0798
Mozilla Firefox before 20.0 on Android uses world-writable and world-readable permissions for the app_tmp installation directory in the local filesystem, which allows attackers to modify add-ons before installation via an application that leverages the time window during which app_tmp is used.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2021:0871
Red Hat Security Advisory: Red Hat Integration Debezium 1.4.2 security update
mongo-java-driver: client-side field level encryption not verifying KMS host name
[ "cpe:/a:redhat:integration:1" ]
null
6.4
null
null
null
RHSA-2013:0925
Red Hat Security Advisory: rhev-guest-tools-iso security and bug fix update
rhevm: rhev agent service unquoted search path rhevm: spice service unquoted search path
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
null
GHSA-5v8j-jfmm-6x86
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
[]
null
8.1
null
null
null
GHSA-hpwc-g7x9-qgm8
Missing Authorization vulnerability in Beat Kueffer Termin-Kalender allows Stored XSS.This issue affects Termin-Kalender: from n/a through 0.99.47.
[]
null
6.5
null
null
null
GHSA-h53g-vpfh-v4gr
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gurcharan Singh Fitness calculators plugin plugin <= 2.0.7 versions.
[]
null
5.9
null
null
null
CVE-2008-4050
A certain ActiveX control in fwRemoteCfg.dll 3.3.3.1 in Friendly Technologies FriendlyPPPoE Client 3.0.0.57 allows remote attackers to (1) create and read arbitrary registry values via the RegistryValue method, and (2) read arbitrary files via the GetTextFile method.
[ "cpe:2.3:a:friendly_technologies:friendly_pppoe_client:3.0.0.57:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2024-54302
WordPress VForm plugin <= 3.0.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vikas Ratudi VForm allows Reflected XSS.This issue affects VForm: from n/a through 3.0.0.
[]
null
7.1
null
null
null
GHSA-64jr-ggw8-h9jc
Credentials stored in plain text by debian-package-builder Plugin
debian-package-builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file `ru.yandex.jenkins.plugins.debuilder.DebianPackageBuilder.xml` on the Jenkins controller. This credential can be viewed by users with access to the Jenkins controller file system.
[]
null
3.3
null
null
null
GHSA-qwf3-mcpp-79x7
Unspecified vulnerability in Oracle BEA WebLogic Server 10.3, 10.0 Gold through MP1, 9.2 Gold through MP3, 9.1, 9.0, 8.1 Gold through SP6, and 7.0 Gold through SP7 allows remote attackers to gain privileges via unknown vectors.
[]
null
null
null
null
null
CVE-2021-4427
The Vuukle Comments, Reactions, Share Bar, Revenue plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.31. This is due to missing or incorrect nonce validation in the /admin/partials/free-comments-for-wordpress-vuukle-admin-display.php file. This makes it possible for unauthenticated attackers to edit the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:vuukle:vuukle_comments\\,_reactions\\,_share_bar\\,_revenue:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-vr8h-63cg-wc5g
Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.4 allows a local, unauthenticated attacker to pair a rogue keypad to an armed system.
[]
null
null
null
null
null
RHSA-2023:0389
Red Hat Security Advisory: OpenJDK 17.0.6 Security Update for Portable Linux Builds
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:openjdk:17" ]
null
3.7
null
null
null
CVE-2020-12426
Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 78.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
CVE-2022-27982
RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain a remote code execution (RCE) vulnerability via the fileName parameter at /guest_auth/cfg/upLoadCfg.php.
[ "cpe:2.3:o:ruijienetworks:rg-nbr2100g-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruijienetworks:rg-nbr2100g-e:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2021-31363
Junos OS and Junos OS Evolved: Receipt of a specific LDP message will cause a Denial of Service
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps. If a system with sensor-based-stats enabled receives a specific LDP FEC this can lead to the above condition. Continued receipted of such an LDP FEC will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 version 19.2R2 and later versions prior to 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R2. Juniper Networks Junos OS Evolved All versions prior to 20.1R2-S3-EVO; 20.3 versions prior to 20.3R1-S2-EVO.
[ "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s1:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-9rw6-x6f2-42c3
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
[]
null
null
null
null
null
GHSA-57v4-gr9v-w9jf
Double free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
GHSA-g56r-phrf-6pc4
HTTP::Tiny 0.082, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
[]
null
8.1
null
null
null
CVE-2005-3408
SQL injection vulnerability in news.php in gCards version 1.43 allows remote attackers to execute arbitrary SQL commands via the limit parameter.
[ "cpe:2.3:a:greg_neustaetter:gcards:1.43:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-wmrx-g8f2-rgwh
CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
[]
null
9.8
null
null
null
CVE-2004-1100
Cross-site scripting (XSS) vulnerability in mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to execute arbitrary web script or HTML via the append parameter.
[ "cpe:2.3:a:tips:mailpost:5.1.1sv:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-5fqq-j3v5-v823
Reflected Cross-Site Scripting (XSS) in osCommerce v4. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the name of any parameter in /watch/en/about-us. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
[]
5.1
null
null
null
null
GHSA-5gw7-g26r-r6wh
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()The ieee80211 skb control block key (set when skb was queued) could have been removed before ieee80211_tx_dequeue() call. ieee80211_tx_dequeue() already called ieee80211_tx_h_select_key() to get the current key, but the latter do not update the key in skb control block in case it is NULL. Because some drivers actually use this key in their TX callbacks (e.g. ath1{1,2}k_mac_op_tx()) this could lead to the use after free below:BUG: KASAN: slab-use-after-free in ath11k_mac_op_tx+0x590/0x61c Read of size 4 at addr ffffff803083c248 by task kworker/u16:4/1440CPU: 3 UID: 0 PID: 1440 Comm: kworker/u16:4 Not tainted 6.13.0-ge128f627f404 #2 Hardware name: HW (DT) Workqueue: bat_events batadv_send_outstanding_bcast_packet Call trace: show_stack+0x14/0x1c (C) dump_stack_lvl+0x58/0x74 print_report+0x164/0x4c0 kasan_report+0xac/0xe8 __asan_report_load4_noabort+0x1c/0x24 ath11k_mac_op_tx+0x590/0x61c ieee80211_handle_wake_tx_queue+0x12c/0x1c8 ieee80211_queue_skb+0xdcc/0x1b4c ieee80211_tx+0x1ec/0x2bc ieee80211_xmit+0x224/0x324 __ieee80211_subif_start_xmit+0x85c/0xcf8 ieee80211_subif_start_xmit+0xc0/0xec4 dev_hard_start_xmit+0xf4/0x28c __dev_queue_xmit+0x6ac/0x318c batadv_send_skb_packet+0x38c/0x4b0 batadv_send_outstanding_bcast_packet+0x110/0x328 process_one_work+0x578/0xc10 worker_thread+0x4bc/0xc7c kthread+0x2f8/0x380 ret_from_fork+0x10/0x20Allocated by task 1906: kasan_save_stack+0x28/0x4c kasan_save_track+0x1c/0x40 kasan_save_alloc_info+0x3c/0x4c __kasan_kmalloc+0xac/0xb0 __kmalloc_noprof+0x1b4/0x380 ieee80211_key_alloc+0x3c/0xb64 ieee80211_add_key+0x1b4/0x71c nl80211_new_key+0x2b4/0x5d8 genl_family_rcv_msg_doit+0x198/0x240 <...>Freed by task 1494: kasan_save_stack+0x28/0x4c kasan_save_track+0x1c/0x40 kasan_save_free_info+0x48/0x94 __kasan_slab_free+0x48/0x60 kfree+0xc8/0x31c kfree_sensitive+0x70/0x80 ieee80211_key_free_common+0x10c/0x174 ieee80211_free_keys+0x188/0x46c ieee80211_stop_mesh+0x70/0x2cc ieee80211_leave_mesh+0x1c/0x60 cfg80211_leave_mesh+0xe0/0x280 cfg80211_leave+0x1e0/0x244 <...>Reset SKB control block key before calling ieee80211_tx_h_select_key() to avoid that.
[]
null
null
null
null
null
GHSA-mm96-9vx8-pfhj
SQL Injection vulnerability in victor cms 1.0 allows attackers to execute arbitrary commands via the post parameter to /post.php in a crafted GET request.
[]
null
9.8
null
null
null
CVE-2017-6377
When adding a private file via the editor in Drupal 8.2.x before 8.2.7, the editor will not correctly check access for the file being attached, resulting in an access bypass.
[ "cpe:2.3:a:drupal:drupal:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.6:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-hc96-pmx9-jcj6
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
[]
null
6.7
null
null
null
RHSA-2023:7820
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.10 Bug Fix Update
validator: Inefficient Regular Expression Complexity in Validator.js
[ "cpe:/a:redhat:openshift_data_foundation:4.12::el8" ]
null
7.5
null
null
null
GHSA-r3pc-78rj-23fr
BlogCMS through 2016-10-25 has XSS via a comment.
[]
null
null
6.1
null
null
CVE-2014-2888
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
[ "cpe:2.3:a:herry:sfpagent:*:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.0.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.11:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.12:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.13:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.14:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.11:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.12:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.13:*:*:*:*:ruby:*:*" ]
null
null
null
7.5
null
GHSA-2g48-mphv-rw7c
Multiple cross-site scripting (XSS) vulnerabilities in eGroupware before 1.0.0.007 allow remote attackers to inject arbitrary web script or HTML via the (1) ab_id, (2) page, (3) type, or (4) lang parameter to index.php or (5) category_id parameter.
[]
null
null
null
null
null