id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2014-9800
|
Integer overflow in lib/heap/heap.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28822150 and Qualcomm internal bug CR692478.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-pwr9-jmgc-9j48
|
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36993291.
|
[] | null | null | 5.5 | null | null |
|
GHSA-2p95-qr38-wg9f
|
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.
|
[] | null | null | 9.9 | null | null |
|
GHSA-96w8-f5p6-mqmw
|
Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.
|
[] | null | null | null | null | null |
|
RHSA-2024:5519
|
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 security update
|
kernel: net: kernel: UAF in network route management
|
[
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 7.8 | null | null | null |
GHSA-hfg2-wf6j-x53p
|
SQLAlchemy vulnerable to SQL injection
|
Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.
|
[] | 9.3 | 9.8 | null | null | null |
GHSA-5hp8-35wj-m525
|
Uncontrolled recursion in ammonia
|
An issue was discovered in the ammonia crate before 2.1.0 for Rust. There is uncontrolled recursion during HTML DOM tree serialization.
|
[] | null | null | 7.5 | null | null |
CVE-2019-16018
|
Cisco IOS XR Software EVPN Operational Routes Denial of Service Vulnerability
|
A vulnerability in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of a BGP update message that contains crafted EVPN attributes. An attacker could indirectly exploit the vulnerability by sending BGP EVPN update messages with a specific, malformed attribute to an affected system and waiting for a user on the device to display the EVPN operational routes’ status. If successful, the attacker could cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
|
[
"cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:xrv_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_540l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*"
] | null | null | 7.4 | null | null |
GHSA-c5gw-57vh-36mj
|
Cross-site scripting (XSS) vulnerability in the web management interface in F5 BIG-IP 9.4.3 allows remote attackers to inject arbitrary web script or HTML via (1) the name of a node object, or the (2) sysContact or (3) sysLocation SNMP configuration field, aka "Audit Log XSS." NOTE: these issues might be resultant from cross-site request forgery (CSRF) vulnerabilities.
|
[] | null | null | null | null | null |
|
RHSA-2021:0289
|
Red Hat Security Advisory: firefox security update
|
Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null | null |
GHSA-q5jf-fjpf-mq77
|
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.7.0 and 12.1.2.0 allows remote authenticated users to affect confidentiality via vectors related to plugin 1.1.
|
[] | null | null | null | null | null |
|
GHSA-jcph-jfm7-9jg7
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2021-37548
|
In JetBrains TeamCity before 2021.1, passwords in cleartext sometimes could be stored in VCS.
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-26688
|
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
|
Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
CVE-2025-24813
|
Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
|
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack
Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
|
[] | null | 9.8 | null | null | null |
GHSA-h2r9-q8w8-hpcr
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | null | 4.3 | null | null |
|
GHSA-7m8c-9m95-h39f
|
IBM OpenPages with Watson 8.3 and 9.0 may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature.
|
[] | null | 5.3 | null | null | null |
|
GHSA-xmpq-x22f-7jg3
|
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
|
[] | null | 8.8 | null | null | null |
|
CVE-2006-3419
|
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
|
[
"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-q9jx-r63x-g7f5
|
vqSoft vqServer stores sensitive information such as passwords in cleartext in the server.cfg file, which allows attackers to gain privileges.
|
[] | null | null | null | null | null |
|
CVE-2015-9229
|
In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter.
|
[
"cpe:2.3:a:imagely:nextgen_gallery:2.1.15:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 | null |
|
CVE-2023-46765
|
Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-pr7g-498h-frwf
|
In the Linux kernel, the following vulnerability has been resolved:ALSA: seq: oss: Fix races at processing SysEx messagesOSS sequencer handles the SysEx messages split in 6 bytes packets, and
ALSA sequencer OSS layer tries to combine those. It stores the data
in the internal buffer and this access is racy as of now, which may
lead to the out-of-bounds access.As a temporary band-aid fix, introduce a mutex for serializing the
process of the SysEx message packets.
|
[] | null | null | null | null | null |
|
CVE-2011-1015
|
The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
|
[
"cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-49704
|
A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The Generic Data Mapper, the Engineering Adapter, and the Engineering Interface improperly handle XML External Entity (XXE) entries when parsing configuration and mapping files. This could allow an attacker to extract any file with a known location on the user's system or accessible network folders by persuading a user to use a maliciously crafted configuration or mapping file in one of the affected components.
|
[] | 5.7 | 5.5 | null | null | null |
|
CVE-2020-10207
|
Use of Hard-coded Credentials in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows remote attackers to retrieve and modify the device settings.
|
[
"cpe:2.3:o:amino:ak45x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak45x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:ak5xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak5xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:ak65x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:aria6xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:aria6xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:aria7xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:aria7xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:kami7b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:kami7b:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-49250
|
WordPress Table of Contents Plus plugin <= 2408 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Michael Tran Table of Contents Plus allows Cross Site Request Forgery.This issue affects Table of Contents Plus: from n/a through 2408.
|
[
"cpe:2.3:a:dublue:table_of_contents_plus:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-q986-4c56-gm92
|
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8636, and CVE-2015-8645.
|
[] | null | null | 8.8 | null | null |
|
RHSA-2024:4427
|
Red Hat Security Advisory: fence-agents security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 5.4 | null | null | null |
CVE-2023-33099
|
Improper Input Validation in Multi-Mode Call Processor
|
Transient DOS while processing SMS container of non-standard size received in DL NAS transport in NR.
|
[
"cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_782g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_782g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_855_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_860_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_860_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
ICSA-14-079-02
|
Siemens SIMATIC S7-1200 Vulnerabilities
|
Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets, a different vulnerability than CVE-2014-2259. The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors, a different vulnerability than CVE-2014-2251. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted PROFINET packets, a different vulnerability than CVE-2014-2253. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets, a different vulnerability than CVE-2014-2255. Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets, a different vulnerability than CVE-2014-2257.
|
[] | null | null | null | null | null |
CVE-2006-0119
|
Multiple unspecified vulnerabilities in IBM Lotus Notes and Domino Server before 6.5.5 have unknown impact and attack vectors, due to "potential security issues" as identified by SPR numbers (1) GPKS6C9J67 in Agents, (2) JGAN6B6TZ3 and (3) KSPR699NBP in the Router, (4) GPKS5YQGPT in Security, or (5) HSAO6BNL6Y in the Web Server. NOTE: vector 3 is related to an issue in NROUTER in IBM Lotus Notes and Domino Server before 6.5.4 FP1, 6.5.5, and 7.0, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted vCal meeting request sent via SMTP (aka SPR# KSPR699NBP).
|
[
"cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp1:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp2:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-w7qc-8c3p-gg37
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exnet Informatics Software Ferry Reservation System allows Reflected XSS.This issue affects Ferry Reservation System: before 240805-002.
|
[] | 8.8 | null | null | null | null |
|
GHSA-8h44-39jg-7c5x
|
Schneider Electric StruxureWare Building Expert MPM before 2.15 does not use encryption for the client-server data stream, which allows remote attackers to discover credentials by sniffing the network.
|
[] | null | null | null | null | null |
|
CVE-2024-48734
|
Unrestricted file upload in /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} in SAS Studio 9.4 allows remote attacker to upload malicious files. NOTE: this is disputed by the vendor because file upload is allowed for authorized users.
|
[
"cpe:2.3:a:sas:studio:9.4:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2022-49722
|
ice: Fix memory corruption in VF driver
|
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix memory corruption in VF driver
Disable VF's RX/TX queues, when it's disabled. VF can have queues enabled,
when it requests a reset. If PF driver assumes that VF is disabled,
while VF still has queues configured, VF may unmap DMA resources.
In such scenario device still can map packets to memory, which ends up
silently corrupting it.
Previously, VF driver could experience memory corruption, which lead to
crash:
[ 5119.170157] BUG: unable to handle kernel paging request at 00001b9780003237
[ 5119.170166] PGD 0 P4D 0
[ 5119.170173] Oops: 0002 [#1] PREEMPT_RT SMP PTI
[ 5119.170181] CPU: 30 PID: 427592 Comm: kworker/u96:2 Kdump: loaded Tainted: G W I --------- - - 4.18.0-372.9.1.rt7.166.el8.x86_64 #1
[ 5119.170189] Hardware name: Dell Inc. PowerEdge R740/014X06, BIOS 2.3.10 08/15/2019
[ 5119.170193] Workqueue: iavf iavf_adminq_task [iavf]
[ 5119.170219] RIP: 0010:__page_frag_cache_drain+0x5/0x30
[ 5119.170238] Code: 0f 0f b6 77 51 85 f6 74 07 31 d2 e9 05 df ff ff e9 90 fe ff ff 48 8b 05 49 db 33 01 eb b4 0f 1f 80 00 00 00 00 0f 1f 44 00 00 <f0> 29 77 34 74 01 c3 48 8b 07 f6 c4 80 74 0f 0f b6 77 51 85 f6 74
[ 5119.170244] RSP: 0018:ffffa43b0bdcfd78 EFLAGS: 00010282
[ 5119.170250] RAX: ffffffff896b3e40 RBX: ffff8fb282524000 RCX: 0000000000000002
[ 5119.170254] RDX: 0000000049000000 RSI: 0000000000000000 RDI: 00001b9780003203
[ 5119.170259] RBP: ffff8fb248217b00 R08: 0000000000000022 R09: 0000000000000009
[ 5119.170262] R10: 2b849d6300000000 R11: 0000000000000020 R12: 0000000000000000
[ 5119.170265] R13: 0000000000001000 R14: 0000000000000009 R15: 0000000000000000
[ 5119.170269] FS: 0000000000000000(0000) GS:ffff8fb1201c0000(0000) knlGS:0000000000000000
[ 5119.170274] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 5119.170279] CR2: 00001b9780003237 CR3: 00000008f3e1a003 CR4: 00000000007726e0
[ 5119.170283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 5119.170286] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 5119.170290] PKRU: 55555554
[ 5119.170292] Call Trace:
[ 5119.170298] iavf_clean_rx_ring+0xad/0x110 [iavf]
[ 5119.170324] iavf_free_rx_resources+0xe/0x50 [iavf]
[ 5119.170342] iavf_free_all_rx_resources.part.51+0x30/0x40 [iavf]
[ 5119.170358] iavf_virtchnl_completion+0xd8a/0x15b0 [iavf]
[ 5119.170377] ? iavf_clean_arq_element+0x210/0x280 [iavf]
[ 5119.170397] iavf_adminq_task+0x126/0x2e0 [iavf]
[ 5119.170416] process_one_work+0x18f/0x420
[ 5119.170429] worker_thread+0x30/0x370
[ 5119.170437] ? process_one_work+0x420/0x420
[ 5119.170445] kthread+0x151/0x170
[ 5119.170452] ? set_kthread_struct+0x40/0x40
[ 5119.170460] ret_from_fork+0x35/0x40
[ 5119.170477] Modules linked in: iavf sctp ip6_udp_tunnel udp_tunnel mlx4_en mlx4_core nfp tls vhost_net vhost vhost_iotlb tap tun xt_CHECKSUM ipt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache sunrpc intel_rapl_msr iTCO_wdt iTCO_vendor_support dell_smbios wmi_bmof dell_wmi_descriptor dcdbas kvm_intel kvm irqbypass intel_rapl_common isst_if_common skx_edac irdma nfit libnvdimm x86_pkg_temp_thermal i40e intel_powerclamp coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel ib_uverbs rapl ipmi_ssif intel_cstate intel_uncore mei_me pcspkr acpi_ipmi ib_core mei lpc_ich i2c_i801 ipmi_si ipmi_devintf wmi ipmi_msghandler acpi_power_meter xfs libcrc32c sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ice ahci drm libahci crc32c_intel libata tg3 megaraid_sas
[ 5119.170613] i2c_algo_bit dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: iavf]
[ 5119.170627] CR2: 00001b9780003237
|
[] | null | null | null | null | null |
CVE-2001-1070
|
Sage Software MAS 200 allows remote attackers to cause a denial of service by connecting to port 10000 and entering a series of control characters.
|
[
"cpe:2.3:a:sage_software:mas_200:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2009-4335
|
Multiple unspecified vulnerabilities in bundled stored procedures in the Spatial Extender component in IBM DB2 9.5 before FP5 have unknown impact and remote attack vectors, related to "remote exploits."
|
[
"cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp4a:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2008-2568
|
SQL injection vulnerability in the Simple Shop Galore (com_simpleshop) component 3.4 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a browse action to index.php.
|
[
"cpe:2.3:a:joomla:com_simpleshop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-xrf9-3q75-637f
|
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-42102
|
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability
|
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20409.
|
[
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2024-46555
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the pb parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[
"cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-wwmp-583h-v424
|
Mitake smart stock selection system contains a broken authentication vulnerability. By manipulating the parameters in the URL, remote attackers can gain the privileged permissions to access transaction record, and fraudulent trading without login.
|
[] | null | null | null | null | null |
|
GHSA-xw74-7c4m-397f
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18658.
|
[] | null | 5.5 | null | null | null |
|
GHSA-84qq-m3p7-pqjh
|
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. An out-of-bounds read vulnerability may be exploited by processing specially crafted project files, which may allow an attacker to read information.
|
[] | null | 5.5 | null | null | null |
|
GHSA-3wjh-qhxw-f3h6
|
Simple Machines Forum (SMF) 2.0.4 allows local file inclusion, with resultant remote code execution, in install.php via ../ directory traversal in the db_type parameter if install.php remains present after installation.
|
[] | null | null | 8.8 | null | null |
|
GHSA-jfph-3485-2gcv
|
Vulnerability in Drupal Panelizer (obsolete).This issue affects Panelizer (obsolete): *.*.
|
[] | null | 5.9 | null | null | null |
|
GHSA-37g9-8cjr-x358
|
Resource leakage issue during dci client registration due to reference count is not decremented if dci client registration fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
|
[] | null | null | null | null | null |
|
CVE-2020-10082
|
GitLab 12.2 through 12.8.1 allows Denial of Service. A denial of service vulnerability impacting the designs for public issues was discovered.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-79qc-cqh8-5jjg
|
In PVRSRVBridgeDevicememHistorySparseChange of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270399633
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-31426
|
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.2-49151. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Tools component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel on the target guest system. Was ZDI-CAN-12791.
|
[
"cpe:2.3:a:parallels:parallels_desktop:16.1.2-49151:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2025-29040
|
An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c
|
[] | null | 9.8 | null | null | null |
|
GHSA-hwwv-phfq-243p
|
In the Linux kernel, the following vulnerability has been resolved:perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freqCurrently, using PEBS-via-PT with a sample frequency instead of a sample
period, causes a segfault. For example:That happens because intel_pmu_pebs_event_update_no_drain() assumes all the
pebs_enabled bits represent counter indexes, which is not always the case.
In this particular case, bits 60 and 61 are set for PEBS-via-PT purposes.The behaviour of PEBS-via-PT with sample frequency is questionable because
although a PMI is generated (PEBS_PMI_AFTER_EACH_RECORD), the period is not
adjusted anyway.Putting that aside, fix intel_pmu_pebs_event_update_no_drain() by passing
the mask of counter bits instead of 'size'. Note, prior to the Fixes
commit, 'size' would be limited to the maximum counter index, so the issue
was not hit.
|
[] | null | null | null | null | null |
|
CVE-2025-50058
|
Extension - rsjoomla.com - Stored XSS vulnerability in RSDirectory! component 1.16.3-1.17.7 for Joomla
|
A stored XSS vulnerability in the RSDirectory! component 1.0.0-2.2.8 Joomla was discovered. The issue allows remote authenticated attackers to inject arbitrary web script or HTML via the review reply component.
|
[] | 5.1 | null | null | null | null |
GHSA-cp6v-m93c-8q82
|
Dell SupportAssist Client Consumer versions (3.11.0 and versions prior) and Dell SupportAssist Client Commercial versions (3.2.0 and versions prior) contain a privilege escalation vulnerability. A non-admin user can exploit the vulnerability and gain admin access to the system.
|
[] | null | 7.8 | null | null | null |
|
GHSA-rfm2-f94j-qhjp
|
OpenStack Storlets arbitrary code execution vulnerability
|
An issue in OpenStack Storlets yoga-eom allows a remote attacker to execute arbitrary code via the gateway.py component.
|
[] | null | 7.8 | null | null | null |
CVE-2016-1000005
|
mcrypt_get_block_size did not enforce that the provided "module" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
|
[
"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2023:0810
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null | null |
CVE-2015-1292
|
The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2019-8277
|
UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
|
[
"cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinumerik_access_mymachine\\/p2p:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\\/ipc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\\/ipc:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-6r8r-mxw7-gj29
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Primary Addon for Elementor allows Stored XSS.This issue affects Primary Addon for Elementor: from n/a through 1.5.8.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-42838
|
An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.1, macOS Monterey 12.7.2. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-whx7-jg3x-m7fw
|
In the Linux kernel, the following vulnerability has been resolved:KVM: VMX: Reset eVMCS controls in VP assist page during hardware disablingReset the eVMCS controls in the per-CPU VP assist page during hardware
disabling instead of waiting until kvm-intel's module exit. The controls
are activated if and only if KVM creates a VM, i.e. don't need to be
reset if hardware is never enabled.Doing the reset during hardware disabling will naturally fix a potential
NULL pointer deref bug once KVM disables CPU hotplug while enabling and
disabling hardware (which is necessary to fix a variety of bugs). If the
kernel is running as the root partition, the VP assist page is unmapped
during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs
to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to
write to a CPU's VP assist page after it's unmapped.
|
[] | null | null | null | null | null |
|
CVE-2022-4728
|
Graphite Web Cookie cross site scripting
|
A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:graphite_project:graphite:-:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
GHSA-37p4-269j-q6r9
|
SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php.
|
[] | null | 6.5 | null | null | null |
|
GHSA-h728-7p3p-f89q
|
In the Linux kernel, the following vulnerability has been resolved:PCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains()of_get_child_by_name() returns a node pointer with refcount incremented, so
we should use of_node_put() on it when we don't need it anymore.Add missing of_node_put() to avoid refcount leak.
|
[] | null | null | null | null | null |
|
GHSA-xjph-r444-9j84
|
Incorrect Default Permissions vulnerability in Hitachi Storage Provider for VMware vCenter allows local users to read and write specific files.This issue affects Hitachi Storage Provider for VMware vCenter: from 3.1.0 before 3.7.4.
|
[] | null | 4.4 | null | null | null |
|
CVE-2023-41060
|
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. A remote user may be able to cause kernel code execution.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2021-22962
|
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*"
] | null | null | 7.3 | null | null |
|
CVE-2013-0798
|
Mozilla Firefox before 20.0 on Android uses world-writable and world-readable permissions for the app_tmp installation directory in the local filesystem, which allows attackers to modify add-ons before installation via an application that leverages the time window during which app_tmp is used.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2021:0871
|
Red Hat Security Advisory: Red Hat Integration Debezium 1.4.2 security update
|
mongo-java-driver: client-side field level encryption not verifying KMS host name
|
[
"cpe:/a:redhat:integration:1"
] | null | 6.4 | null | null | null |
RHSA-2013:0925
|
Red Hat Security Advisory: rhev-guest-tools-iso security and bug fix update
|
rhevm: rhev agent service unquoted search path rhevm: spice service unquoted search path
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null | null |
GHSA-5v8j-jfmm-6x86
|
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
|
[] | null | 8.1 | null | null | null |
|
GHSA-hpwc-g7x9-qgm8
|
Missing Authorization vulnerability in Beat Kueffer Termin-Kalender allows Stored XSS.This issue affects Termin-Kalender: from n/a through 0.99.47.
|
[] | null | 6.5 | null | null | null |
|
GHSA-h53g-vpfh-v4gr
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gurcharan Singh Fitness calculators plugin plugin <= 2.0.7 versions.
|
[] | null | 5.9 | null | null | null |
|
CVE-2008-4050
|
A certain ActiveX control in fwRemoteCfg.dll 3.3.3.1 in Friendly Technologies FriendlyPPPoE Client 3.0.0.57 allows remote attackers to (1) create and read arbitrary registry values via the RegistryValue method, and (2) read arbitrary files via the GetTextFile method.
|
[
"cpe:2.3:a:friendly_technologies:friendly_pppoe_client:3.0.0.57:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2024-54302
|
WordPress VForm plugin <= 3.0.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vikas Ratudi VForm allows Reflected XSS.This issue affects VForm: from n/a through 3.0.0.
|
[] | null | 7.1 | null | null | null |
GHSA-64jr-ggw8-h9jc
|
Credentials stored in plain text by debian-package-builder Plugin
|
debian-package-builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file `ru.yandex.jenkins.plugins.debuilder.DebianPackageBuilder.xml` on the Jenkins controller. This credential can be viewed by users with access to the Jenkins controller file system.
|
[] | null | 3.3 | null | null | null |
GHSA-qwf3-mcpp-79x7
|
Unspecified vulnerability in Oracle BEA WebLogic Server 10.3, 10.0 Gold through MP1, 9.2 Gold through MP3, 9.1, 9.0, 8.1 Gold through SP6, and 7.0 Gold through SP7 allows remote attackers to gain privileges via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2021-4427
|
The Vuukle Comments, Reactions, Share Bar, Revenue plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.31. This is due to missing or incorrect nonce validation in the /admin/partials/free-comments-for-wordpress-vuukle-admin-display.php file. This makes it possible for unauthenticated attackers to edit the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:vuukle:vuukle_comments\\,_reactions\\,_share_bar\\,_revenue:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-vr8h-63cg-wc5g
|
Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.4 allows a local, unauthenticated attacker to pair a rogue keypad to an armed system.
|
[] | null | null | null | null | null |
|
RHSA-2023:0389
|
Red Hat Security Advisory: OpenJDK 17.0.6 Security Update for Portable Linux Builds
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:openjdk:17"
] | null | 3.7 | null | null | null |
CVE-2020-12426
|
Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 78.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2022-27982
|
RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain a remote code execution (RCE) vulnerability via the fileName parameter at /guest_auth/cfg/upLoadCfg.php.
|
[
"cpe:2.3:o:ruijienetworks:rg-nbr2100g-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruijienetworks:rg-nbr2100g-e:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2021-31363
|
Junos OS and Junos OS Evolved: Receipt of a specific LDP message will cause a Denial of Service
|
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps. If a system with sensor-based-stats enabled receives a specific LDP FEC this can lead to the above condition. Continued receipted of such an LDP FEC will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 version 19.2R2 and later versions prior to 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R2. Juniper Networks Junos OS Evolved All versions prior to 20.1R2-S3-EVO; 20.3 versions prior to 20.3R1-S2-EVO.
|
[
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s1:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-9rw6-x6f2-42c3
|
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
|
[] | null | null | null | null | null |
|
GHSA-57v4-gr9v-w9jf
|
Double free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
|
GHSA-g56r-phrf-6pc4
|
HTTP::Tiny 0.082, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
|
[] | null | 8.1 | null | null | null |
|
CVE-2005-3408
|
SQL injection vulnerability in news.php in gCards version 1.43 allows remote attackers to execute arbitrary SQL commands via the limit parameter.
|
[
"cpe:2.3:a:greg_neustaetter:gcards:1.43:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wmrx-g8f2-rgwh
|
CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
|
[] | null | 9.8 | null | null | null |
|
CVE-2004-1100
|
Cross-site scripting (XSS) vulnerability in mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to execute arbitrary web script or HTML via the append parameter.
|
[
"cpe:2.3:a:tips:mailpost:5.1.1sv:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-5fqq-j3v5-v823
|
Reflected Cross-Site Scripting (XSS) in osCommerce v4. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the name of any parameter in /watch/en/about-us. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
|
[] | 5.1 | null | null | null | null |
|
GHSA-5gw7-g26r-r6wh
|
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()The ieee80211 skb control block key (set when skb was queued) could have
been removed before ieee80211_tx_dequeue() call. ieee80211_tx_dequeue()
already called ieee80211_tx_h_select_key() to get the current key, but
the latter do not update the key in skb control block in case it is
NULL. Because some drivers actually use this key in their TX callbacks
(e.g. ath1{1,2}k_mac_op_tx()) this could lead to the use after free
below:BUG: KASAN: slab-use-after-free in ath11k_mac_op_tx+0x590/0x61c
Read of size 4 at addr ffffff803083c248 by task kworker/u16:4/1440CPU: 3 UID: 0 PID: 1440 Comm: kworker/u16:4 Not tainted 6.13.0-ge128f627f404 #2
Hardware name: HW (DT)
Workqueue: bat_events batadv_send_outstanding_bcast_packet
Call trace:
show_stack+0x14/0x1c (C)
dump_stack_lvl+0x58/0x74
print_report+0x164/0x4c0
kasan_report+0xac/0xe8
__asan_report_load4_noabort+0x1c/0x24
ath11k_mac_op_tx+0x590/0x61c
ieee80211_handle_wake_tx_queue+0x12c/0x1c8
ieee80211_queue_skb+0xdcc/0x1b4c
ieee80211_tx+0x1ec/0x2bc
ieee80211_xmit+0x224/0x324
__ieee80211_subif_start_xmit+0x85c/0xcf8
ieee80211_subif_start_xmit+0xc0/0xec4
dev_hard_start_xmit+0xf4/0x28c
__dev_queue_xmit+0x6ac/0x318c
batadv_send_skb_packet+0x38c/0x4b0
batadv_send_outstanding_bcast_packet+0x110/0x328
process_one_work+0x578/0xc10
worker_thread+0x4bc/0xc7c
kthread+0x2f8/0x380
ret_from_fork+0x10/0x20Allocated by task 1906:
kasan_save_stack+0x28/0x4c
kasan_save_track+0x1c/0x40
kasan_save_alloc_info+0x3c/0x4c
__kasan_kmalloc+0xac/0xb0
__kmalloc_noprof+0x1b4/0x380
ieee80211_key_alloc+0x3c/0xb64
ieee80211_add_key+0x1b4/0x71c
nl80211_new_key+0x2b4/0x5d8
genl_family_rcv_msg_doit+0x198/0x240
<...>Freed by task 1494:
kasan_save_stack+0x28/0x4c
kasan_save_track+0x1c/0x40
kasan_save_free_info+0x48/0x94
__kasan_slab_free+0x48/0x60
kfree+0xc8/0x31c
kfree_sensitive+0x70/0x80
ieee80211_key_free_common+0x10c/0x174
ieee80211_free_keys+0x188/0x46c
ieee80211_stop_mesh+0x70/0x2cc
ieee80211_leave_mesh+0x1c/0x60
cfg80211_leave_mesh+0xe0/0x280
cfg80211_leave+0x1e0/0x244
<...>Reset SKB control block key before calling ieee80211_tx_h_select_key()
to avoid that.
|
[] | null | null | null | null | null |
|
GHSA-mm96-9vx8-pfhj
|
SQL Injection vulnerability in victor cms 1.0 allows attackers to execute arbitrary commands via the post parameter to /post.php in a crafted GET request.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-6377
|
When adding a private file via the editor in Drupal 8.2.x before 8.2.7, the editor will not correctly check access for the file being attached, resulting in an access bypass.
|
[
"cpe:2.3:a:drupal:drupal:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-hc96-pmx9-jcj6
|
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
|
[] | null | 6.7 | null | null | null |
|
RHSA-2023:7820
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.10 Bug Fix Update
|
validator: Inefficient Regular Expression Complexity in Validator.js
|
[
"cpe:/a:redhat:openshift_data_foundation:4.12::el8"
] | null | 7.5 | null | null | null |
GHSA-r3pc-78rj-23fr
|
BlogCMS through 2016-10-25 has XSS via a comment.
|
[] | null | null | 6.1 | null | null |
|
CVE-2014-2888
|
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
|
[
"cpe:2.3:a:herry:sfpagent:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.0.1:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.1:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.2:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.3:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.4:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.5:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.6:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.7:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.8:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.9:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.10:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.11:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.12:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.13:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.1.14:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.1:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.2:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.3:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.4:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.5:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.6:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.7:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.8:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.9:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.2.10:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.1:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.2:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.3:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.4:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.5:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.6:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.7:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.8:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.9:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.3.10:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.1:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.2:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.3:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.4:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.5:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.6:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.7:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.8:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.9:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.10:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.11:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.12:*:*:*:*:ruby:*:*",
"cpe:2.3:a:herry:sfpagent:0.4.13:*:*:*:*:ruby:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2g48-mphv-rw7c
|
Multiple cross-site scripting (XSS) vulnerabilities in eGroupware before 1.0.0.007 allow remote attackers to inject arbitrary web script or HTML via the (1) ab_id, (2) page, (3) type, or (4) lang parameter to index.php or (5) category_id parameter.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.