id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-xpp4-g6wp-qmp7
A vulnerability classified as problematic has been found in IceWarp 12.0.2.1/12.0.3.1. This affects an unknown part of the file /install/ of the component Utility Download Handler. The manipulation of the argument lang with the input 1%27"()%26%25<zzz><ScRiPt>alert(document.domain)</ScRiPt> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
4.3
null
null
GHSA-jvqm-qh85-5q6r
The MQXR service in WMQ Telemetry in IBM WebSphere MQ 7.1 before 7.1.0.7, 7.5 through 7.5.0.5, and 8.0 before 8.0.0.4 uses world-readable permissions for a cleartext file containing the SSL keystore password, which allows local users to obtain sensitive information by reading this file.
[]
null
null
4
null
CVE-2024-48896
Moodle: users' names returned in messaging error message
A vulnerability was found in Moodle. It is possible for users with the "send message" capability to view other users' names that they may not otherwise have access to via an error message in Messaging. Note: The name returned follows the full name format configured on the site.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-vv88-3pw7-jw7q
A cross-site scripting (XSS) filter bypass vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct XSS attacks against a user of an affected device. More Information: CSCvc21620. Known Affected Releases: 10.5(2.14076.1). Known Fixed Releases: 12.0(0.98000.641) 12.0(0.98000.500) 12.0(0.98000.219).
[]
null
null
6.1
null
GHSA-47p7-xfcc-4pv9
php-imap vulnerable to RCE through a directory traversal vulnerability
SummaryAn unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability which results in a remote code execution vulnerability.DetailsAn attacker can send an email with a malicious attachment to the inbox, which gets crawled with webklex/php-imap or webklex/laravel-imap. Prerequisite for the vulnerability is that the script stores the attachments without providing a `$filename`, or providing an unsanitized `$filename`, in `src/Attachment::save(string $path, string $filename = null)` (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L251-L255). In this case, where no `$filename` gets passed into the `Attachment::save()` method, the package would use a series of unsanitized and insecure input values from the mail as fallback (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L252). Even if a developer passes a `$filename` into the `Attachment::save()` method, e.g. by passing the name or filename of the mail attachment itself (from email headers), the input values never get sanitized by the package. There is also no restriction about the file extension (e.g. ".php") or the contents of a file. This allows an attacker to upload malicious code of any type and content at any location where the underlying user has write permissions. The attacker can also overwrite existing files and inject malicious code into files that, e.g. get executed by the system via cron, requests,... The official documentation only shows examples of `Attachment::save()` without providing the `$filename` (https://www.php-imap.com/api/attachment), which makes this vulnerability even more widespread.PoCsend an email with a malicious attachment to an inbox, which gets crawled by the packagecrawl email with malicious attachmentstore the attachment with `Attachment::save('/path/to/storage')` without providing a `$filename` valueImpactThis is a remote code execution vulnerability that is made possible through a directory traversal vulnerability. Every application that stores attachments with `Attachment::save()` without providing a `$filename` or passing unsanitized user input is affected by this attack.
[]
null
9
null
null
CVE-2022-28992
A Cross-Site Request Forgery (CSRF) in Online Banquet Booking System v1.0 allows attackers to change admin credentials via a crafted POST request.
[ "cpe:2.3:a:phpgurukul:online_banquet_booking_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2021-41350
Microsoft Exchange Server Spoofing Vulnerability
Microsoft Exchange Server Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_21:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_10:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-cg87-qmcj-jgfp
Uncontrolled search path in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.3
null
null
GHSA-whgj-xqgq-mp34
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24900.
[]
null
null
7.8
null
CVE-2022-46118
Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/?page=product_per_brand&bid=.
[ "cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2024-11993
Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.4.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field
[]
4.6
null
null
null
GHSA-xrh9-pr8p-fpqj
This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10125.
[]
null
6.5
null
null
CVE-2006-6703
Multiple cross-site scripting (XSS) vulnerabilities in Oracle Portal 9i and 10g allow remote attackers to inject arbitrary JavaScript via the tc parameter in webapp/jsp/container_tabs.jsp, and other unspecified vectors.
[ "cpe:2.3:a:oracle:oracle10g:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2021-38407
Delta Electronics DIALink
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code.
[ "cpe:2.3:a:deltaww:dialink:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2018-5990
SQL Injection exists in the AllVideos Reloaded 1.2.x component for Joomla! via the divid parameter.
[ "cpe:2.3:a:allvideos_reloaded_project:allvideos_reloaded:*:*:*:*:*:joomla\\!:*:*" ]
null
null
9.8
7.5
RHSA-2021:0486
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update
openssl: EDIPARTYNAME NULL pointer de-reference
[ "cpe:/a:redhat:jboss_core_services:1::el7" ]
null
5.9
null
null
GHSA-xhvm-w5fj-p25w
There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1296 in JasPer 2.0.12 that will lead to a remote denial of service attack.
[]
null
7.5
null
null
RHSA-2018:3521
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Multi-Release attribute read from outside of the main manifest attributes (Utility, 8199171) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
GHSA-49mq-f6v3-c6q2
BigTree CMS through 4.2.18 has CSRF related to the core\admin\modules\users\profile\update.php script (modify user information), the index.php/admin/developer/packages/delete/ URI (remove packages), the index.php/admin/developer/upgrade/ignore/?versions= URI, and the index.php/admin/developer/upgrade/set-ftp-directory/ URI.
[]
null
null
8.8
null
GHSA-38cv-ch3v-j5cw
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.Users are recommended to upgrade to version 18.12.13, which fixes the issue.
[]
null
9.1
null
null
GHSA-83qf-hj98-xp2q
Multiple PHP remote file inclusion vulnerabilities in HYIP Manager Pro allow remote attackers to execute arbitrary PHP code via a URL in the plugin_file parameter to (1) Smarty.class.php and (2) Smarty_Compiler.class.php in inc/libs/; (3) core.display_debug_console.php, (4) core.load_plugins.php, (5) core.load_resource_plugin.php, (6) core.process_cached_inserts.php, (7) core.process_compiled_include.php, and (8) core.read_cache_file.php in inc/libs/core/; and other unspecified files. NOTE: (1) and (2) might be incorrectly reported vectors in Smarty.
[]
null
null
null
null
RHSA-2022:0007
Red Hat Security Advisory: idm:DL1 security update
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.2
null
null
CVE-2017-1000463
Leafpub version 1.2.0-beta6 is vulnerable to stored cross-site scripting vulnerability, within the edit blog post page, which can result in disruption of service and execution of javascript code.
[ "cpe:2.3:a:leafpub:leafpub:1.2.0:beta6:*:*:*:*:*:*" ]
null
null
5.4
3.5
RHSA-2008:1023
Red Hat Security Advisory: pidgin security and bug fix update
pidgin: remote DoS via MSN message with crafted file name pidgin: unrestricted download of arbitrary files triggered via UPnP pidgin: NSS plugin doesn't verify SSL certificates
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
GHSA-r5wg-fxw7-6v36
The HD Quiz WordPress plugin before 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
CVE-2020-6112
An exploitable code execution vulnerability exists in the JPEG2000 Stripe Decoding functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242 when decoding sub-samples. While initializing tiles with sub-sample data, the application can miscalculate a pointer for the stripes in the tile which allow for the decoder to write out of-bounds and cause memory corruption. This can result in code execution. A specially crafted image can be embedded inside a PDF and loaded by a victim in order to trigger this vulnerability.
[ "cpe:2.3:a:gonitro:nitro_pro:13.13.2.242:*:*:*:*:*:*:*", "cpe:2.3:a:gonitro:nitro_pro:13.16.2.300:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-4cx5-2fr7-x88f
Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/course/index.php'.
[]
null
7.1
null
null
CVE-2019-4582
IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 167288.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-mppj-ccp4-4673
McAfee Network Data Loss Prevention (NDLP) before 9.3 stores the SSH key in cleartext, which allows local users to obtain sensitive information via unspecified vectors.
[]
null
null
null
null
GHSA-75jr-ff4h-qp4g
SQL injection vulnerability in login.asp in ASPjar Guestbook allows remote attackers to execute arbitrary SQL commands via the password field.
[]
null
null
null
null
GHSA-23v9-8jvm-jh7q
The Visual Link Preview WordPress plugin before 2.2.3 does not enforce authorisation on several AJAX actions and has the CSRF nonce displayed for all authenticated users, allowing any authenticated user (such as subscriber) to call them and 1) Get and search through title and content of Draft post, 2) Get title of a password-protected post as well as 3) Upload an image from an URL
[]
null
5.4
null
null
GHSA-w6mf-3p4q-9p72
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote authenticated users to affect integrity via vectors related to SWSE Server, a different vulnerability than CVE-2016-5463.
[]
null
null
4.1
null
GHSA-7rc9-5vxf-3h3m
In MPD before 0.23.8, as used on Automotive Grade Linux and other platforms, the PipeWire output plugin mishandles a Drain call in certain situations involving truncated files. Eventually there is an assertion failure in libmpdclient because libqtappfw passes in a NULL pointer.
[]
null
7.5
null
null
GHSA-v7jc-crf6-wh7w
In parseMPEGCCData of NuPlayer2CCDecoder.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-111874331
[]
null
null
8.8
null
CVE-2008-2851
Multiple buffer overflows in OFF System before 0.19.14 allow remote attackers to have an unknown impact via unspecified vectors related to "parsing of http headers."
[ "cpe:2.3:a:offsystem:offsystem:0.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.i:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.j:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.k:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.l:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.m:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.n:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.o:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.p:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.10.15.q:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.11.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.11.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.09:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.12.11:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.13.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.13.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.13.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.13.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.13.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.14.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.09:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.15.10:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.09:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.10:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.11:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.12:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.16.13:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.09:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.10:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.11:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.12:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.17.13:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.09:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.10:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.11:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.12:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.13:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.14:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.15:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.16:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.17:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.18:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.18.19:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.00:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.01:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.02:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.03:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.04:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.05:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.06:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.07:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.08:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.09:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.10:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.11:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.12:*:*:*:*:*:*:*", "cpe:2.3:a:offsystem:offsystem:0.19.13:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-93hf-hv49-rhh9
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.
[]
null
4.3
null
null
CVE-2018-14610
An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
5.5
7.1
CVE-2018-18244
Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header.
[ "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-3gqx-89wv-8h66
Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an authenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Reflected XSS.
[]
null
5.4
null
null
CVE-2016-10182
An issue was discovered on the D-Link DWR-932B router. qmiweb allows command injection with ` characters.
[ "cpe:2.3:o:dlink:dwr-932b_firmware:02.02eu:revb:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-932b:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2025-38299
ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY()
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY() ETDM2_IN_BE and ETDM1_OUT_BE are defined as COMP_EMPTY(), in the case the codec dai_name will be null. Avoid a crash if the device tree is not assigning a codec to these links. [ 1.179936] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 1.181065] Mem abort info: [ 1.181420] ESR = 0x0000000096000004 [ 1.181892] EC = 0x25: DABT (current EL), IL = 32 bits [ 1.182576] SET = 0, FnV = 0 [ 1.182964] EA = 0, S1PTW = 0 [ 1.183367] FSC = 0x04: level 0 translation fault [ 1.183983] Data abort info: [ 1.184406] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1.185097] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1.185766] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1.186439] [0000000000000000] user address but active_mm is swapper [ 1.187239] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 1.188029] Modules linked in: [ 1.188420] CPU: 7 UID: 0 PID: 70 Comm: kworker/u32:1 Not tainted 6.14.0-rc4-next-20250226+ #85 [ 1.189515] Hardware name: Radxa NIO 12L (DT) [ 1.190065] Workqueue: events_unbound deferred_probe_work_func [ 1.190808] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1.191683] pc : __pi_strcmp+0x24/0x140 [ 1.192170] lr : mt8195_mt6359_soc_card_probe+0x224/0x7b0 [ 1.192854] sp : ffff800083473970 [ 1.193271] x29: ffff800083473a10 x28: 0000000000001008 x27: 0000000000000002 [ 1.194168] x26: ffff800082408960 x25: ffff800082417db0 x24: ffff800082417d88 [ 1.195065] x23: 000000000000001e x22: ffff800082dbf480 x21: ffff800082dc07b8 [ 1.195961] x20: 0000000000000000 x19: 0000000000000013 x18: 00000000ffffffff [ 1.196858] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000006 [ 1.197755] x14: ffff800082407af0 x13: 6e6f69737265766e x12: 692d6b636f6c6374 [ 1.198651] x11: 0000000000000002 x10: ffff80008240b920 x9 : 0000000000000018 [ 1.199547] x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000 [ 1.200443] x5 : 0000000000000000 x4 : 8080808080000000 x3 : 303933383978616d [ 1.201339] x2 : 0000000000000000 x1 : ffff80008240b920 x0 : 0000000000000000 [ 1.202236] Call trace: [ 1.202545] __pi_strcmp+0x24/0x140 (P) [ 1.203029] mtk_soundcard_common_probe+0x3bc/0x5b8 [ 1.203644] platform_probe+0x70/0xe8 [ 1.204106] really_probe+0xc8/0x3a0 [ 1.204556] __driver_probe_device+0x84/0x160 [ 1.205104] driver_probe_device+0x44/0x130 [ 1.205630] __device_attach_driver+0xc4/0x170 [ 1.206189] bus_for_each_drv+0x8c/0xf8 [ 1.206672] __device_attach+0xa8/0x1c8 [ 1.207155] device_initial_probe+0x1c/0x30 [ 1.207681] bus_probe_device+0xb0/0xc0 [ 1.208165] deferred_probe_work_func+0xa4/0x100 [ 1.208747] process_one_work+0x158/0x3e0 [ 1.209254] worker_thread+0x2c4/0x3e8 [ 1.209727] kthread+0x134/0x1f0 [ 1.210136] ret_from_fork+0x10/0x20 [ 1.210589] Code: 54000401 b50002c6 d503201f f86a6803 (f8408402) [ 1.211355] ---[ end trace 0000000000000000 ]---
[]
null
null
null
null
GHSA-px2r-hc96-6x9w
The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 27.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2013-2261
Cryptocat before 2.0.22 Chrome Extension 'img/keygen.gif' has Information Disclosure
[ "cpe:2.3:a:cryptocat_project:cryptocat:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-6qm8-8j44-j9h2
An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs.
[]
null
null
7.5
null
GHSA-m265-9cv9-6vq9
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
null
null
GHSA-6798-7724-88wh
An issue was discovered in Skybox Platform before 7.5.401. Reflected cross-site scripting vulnerabilities exist in /skyboxview/webservice/services/VersionRepositoryWebService via a soapenv:Body element, or in the status parameter to login.html.
[]
null
null
5.4
null
RHSA-2020:4182
Red Hat Security Advisory: kernel security and bug fix update
kernel: Count overflow in FUSE request leading to use-after-free issues.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
CVE-2020-0948
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0949, CVE-2020-0950.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
GHSA-6mmp-3mq7-r6c3
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[]
null
5.5
null
null
GHSA-chhh-4xrf-42pg
libcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack based buffer when built to use the *macidn* IDN backend. The conversion function then fills up the provided buffer exactly - but does not null terminate the string.This flaw can lead to stack contents accidently getting returned as part of the converted string.
[]
null
3.1
null
null
GHSA-67m4-qxp3-j6hh
TrueLayer.Client SSRF when fetching payment or payment provider
ImpactThe vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure.PatchesVersions of TrueLayer.Client `v1.6.0` and later are not affected.WorkaroundsThe issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the TrueLayer.Client library.
[]
null
null
8.6
null
GHSA-mw37-2wq7-83rg
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
[]
null
null
null
null
CVE-2019-12525
An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
[ "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2018-5552
DocuTrac DTISQLInstaller.exe Hard-Coded Salt
Versions of DocuTrac QuicDoc and Office Therapy that ship with DTISQLInstaller.exe version 1.6.4.0 and prior contains a hard-coded cryptographic salt, "S@l+&pepper".
[ "cpe:2.3:a:docutracinc:dtisqlinstaller:*:*:*:*:*:*:*:*" ]
null
null
2.9
null
GHSA-2rfw-m9cr-h7jf
Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via unknown vectors in (1) NmConsole/Tools.asp and (2) NmConsole/DeviceSelection.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2014-6272
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:libevent_project:libevent:2.1.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-25283
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. BT manager allows attackers to bypass intended access restrictions on a certain mode. The LG ID is LVE-SMP-200021 (September 2020).
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-4jf6-93vm-4232
IBM SecureWay Firewall before 4.2.2 performs extra processing before determining that a packet is invalid and dropping it, which allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed TCP packets without any flags set.
[]
null
null
null
null
GHSA-mmg6-pq22-8rvg
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
[]
null
null
null
null
CVE-2023-47245
WordPress ANAC XML Viewer Plugin <= 1.7 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi ANAC XML Viewer plugin <= 1.7 versions.
[ "cpe:2.3:a:marcomilesi:anac_xml_viewer:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
RHSA-2012:1263
Red Hat Security Advisory: postgresql and postgresql84 security update
module): XXE by applying XSL stylesheet to the document postgresql: File disclosure through XXE in xmlparse by DTD validation
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-xm3j-wpq5-h526
Google Monorail before 2018-05-04 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with an unsupported axis) can be used to obtain sensitive information about the content of bug reports.
[]
null
null
5.3
null
CVE-2025-48232
WordPress Xpro Addons For Beaver Builder – Lite <= 1.5.5 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xpro Xpro Addons For Beaver Builder &#8211; Lite allows Stored XSS. This issue affects Xpro Addons For Beaver Builder &#8211; Lite: from n/a through 1.5.5.
[]
null
6.5
null
null
CVE-2019-3736
Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a password storage vulnerability in the ACM component. A remote authenticated malicious user with root privileges may potentially use a support tool to decrypt encrypted passwords stored locally on the system to use it to access other components using the privileges of the compromised user.
[ "cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.2:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_idpa_dp4400:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_idpa_dp5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_idpa_dp8300:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_idpa_dp8800:-:*:*:*:*:*:*:*" ]
null
null
8.2
null
CVE-2021-4333
The WP Statistics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 13.1.1. This is due to missing or incorrect nonce validation on the view() function. This makes it possible for unauthenticated attackers to activate and deactivate arbitrary plugins, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2018-14567
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
[ "cpe:2.3:a:xmlsoft:libxml2:2.9.8:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-hw3m-8gm5-mc75
Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
GHSA-vq84-wx4w-6r76
Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query.
[]
null
9.8
null
null
CVE-2006-4209
PHP remote file inclusion vulnerability in install3.php in WEBInsta Mailing List Manager 1.3e allows remote attackers to execute arbitrary PHP code via a URL in the cabsolute_path parameter.
[ "cpe:2.3:a:webinsta:mailing_list_manager:1.3e:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-36702
libiec61850 v1.5 was discovered to contain a heap overflow via the BerEncoder_encodeLength function at /asn1/ber_encoder.c.
[ "cpe:2.3:a:mz-automation:libiec61850:1.5.0:*:*:*:*:*:*:*" ]
null
7.4
null
null
CVE-2020-11041
Improper Validation of Array Index in FreeRDP
In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.
[ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
2.2
null
null
GHSA-75jh-c69w-j2r8
Cross-site request forgery (CSRF) vulnerability in the OSF module 7.x-3.x before 7.x-3.1 for Drupal, when the OSF Import module is enabled, allows remote attackers to hijack the authentication of administrators for requests that create new OSF datasets via unspecified vectors.
[]
null
null
null
null
CVE-2022-32801
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5. An app may be able to gain root privileges.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-0146
Naver Map <= 1.1.0 - Contributor+ Stored XSS
The Naver Map WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[ "cpe:2.3:a:naver_map_project:naver_map:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
CVE-2001-0764
Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument.
[ "cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.10:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2018-13042
The 1Password application 6.8 for Android is affected by a Denial Of Service vulnerability. By starting the activity com.agilebits.onepassword.filling.openyolo.OpenYoloDeleteActivity or com.agilebits.onepassword.filling.openyolo.OpenYoloRetrieveActivity from an external application (since they are exported), it is possible to crash the 1Password instance.
[ "cpe:2.3:a:1password:1password:6.8:*:*:*:*:android:*:*" ]
null
null
5.9
4.3
GHSA-25jj-2ph2-cmvq
The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL.
[]
null
7.4
null
null
CVE-2005-3027
Sybari Antigen 8.0 SR2 does not properly filter SMTP messages, which allows remote attackers to bypass custom filter rules and send file attachments of arbitrary file types via a message with a subject of "Antigen forwarded attachment".
[ "cpe:2.3:a:sybari:antigen:8.0:sr2:exchange:*:*:*:*:*", "cpe:2.3:a:sybari:antigen:8.0:sr2:smtp_gateways:*:*:*:*:*" ]
null
null
null
5
GHSA-7gxq-5qqc-v3fc
TYPO3 Open redirect vulnerability in the Access tracking mechanism
Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[]
null
5.3
null
null
CVE-2001-0520
Aladdin eSafe Gateway versions 3.0 and earlier allows a remote attacker to circumvent filtering of SCRIPT tags by embedding the scripts within certain HTML tags including (1) onload in the BODY tag, (2) href in the A tag, (3) the BUTTON tag, (4) the INPUT tag, or (5) any other tag in which scripts can be defined.
[ "cpe:2.3:a:aladdin_knowledge_systems:esafe_gateway:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-79mx-4vf7-wqf7
HCL Domino is susceptible to an information disclosure vulnerability. In some scenarios, local calls made on the server to search the Domino directory will ignore xACL read restrictions. An authenticated attacker could leverage this vulnerability to access attributes from a user's person record.
[]
null
5.5
null
null
GHSA-5mr2-62qq-29fg
There is an improper access control vulnerability in Huawei Share. The software does not properly restrict access to certain file from certain application. An attacker tricks the user into installing a malicious application then establishing a connect to the attacker through Huawei Share, successful exploit could cause information disclosure.
[]
null
null
null
null
CVE-2010-3754
The FXCLI_OraBR_Exec_Command function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 uses values of packet fields to determine the content and length of data copied to memory, which allows remote attackers to execute arbitrary code via a crafted packet. NOTE: this might overlap CVE-2010-3059.
[ "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-8xrm-4q7g-x2h2
Multiple directory traversal vulnerabilities in ha 0.999p+dfsg-5.
[]
null
null
7.5
null
RHSA-2020:3873
Red Hat Security Advisory: libsrtp security and bug fix update
libsrtp: buffer overflow in application of crypto profiles libsrtp: improper handling of CSRC count and extension header length in RTP header
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
GHSA-48vr-cw3x-rrhf
DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the FwBlockServiceSmm driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.23, 5.3: 05.36.23, 5.4: 05.44.23, 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022048
[]
null
6.4
null
null
CVE-2018-18506
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
CVE-2021-41310
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1.
[ "cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2017-12724
A Use of Hard-coded Credentials issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump contains hardcoded credentials, which are not fully initialized. The FTP server is only accessible if the pump is configured to allow FTP connections.
[ "cpe:2.3:o:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:1.1:*:*:*:*:*:*:*", "cpe:2.3:o:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:1.5:*:*:*:*:*:*:*", "cpe:2.3:o:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:1.6:*:*:*:*:*:*:*", "cpe:2.3:h:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:-:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
CVE-2025-46547
In Sherpa Orchestrator 141851, the web application lacks protection against CSRF attacks, with resultant effects of an attacker conducting XSS attacks, adding a new user or role, or exploiting a SQL injection issue.
[]
null
5.4
null
null
GHSA-8p32-q5c5-q65x
VP-ASP Shopping Cart 6.50 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database containing the password via a direct request for database/shopping650.mdb. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-j324-jgjr-rvx5
Out-of-bound read in the wireless driver in the Linux kernel due to lack of check of buffer length. in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDX20, SDX55, SXR1130
[]
null
null
null
null
CVE-2024-2444
Inline Related Posts < 3.5.0 - Admin+ Stored XSS
The Inline Related Posts WordPress plugin before 3.5.0 does not sanitise and escape some of its settings, which could allow high privilege users such as Admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
[ "cpe:2.3:a:data443:inline_related_posts:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
CVE-2023-5218
Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-h99m-6755-rgwc
Rancher Remote Code Execution via Cluster/Node Drivers
ImpactA vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the `chroot` jail and gain root access to the Rancher container itself. In production environments, further privilege escalation is possible based on living off the land within the Rancher container itself. For the test and development environments, based on a –privileged Docker container, it is possible to escape the Docker container and gain execution access on the host system.This happens because:During startup, Rancher appends the `/opt/drivers/management-state/bin` directory to the `PATH` environment variable.In Rancher, the binaries `/usr/bin/rancher-machine`, `/usr/bin/helm_v3`, and `/usr/bin/kustomize` are assigned a UID of 1001 and a GID of 127 instead of being owned by the root user.Rancher employs a jail mechanism to isolate the execution of node drivers from the main process. However, the drivers are executed with excessive permissions.During the registration of new node drivers, its binary is executed with the same user as the parent process, which could enable an attacker to gain elevated privileges by registering a malicious driver.Lack of validation on the driver file type, which allows symbolic links to be used.Please consult the associated [MITRE ATT&CK - Technique - Privilege Escalation](https://attack.mitre.org/tactics/TA0004/) and [MITRE ATT&CK - Technique - Execution](https://attack.mitre.org/tactics/TA0002/) for further information about this category of attack.**Since they run at a privileged level, it is recommended to use trusted drivers only.**PatchesThe fix involves some key areas with the following changes:Fixing the `PATH` environment variable:Remove the step that appends `/opt/drivers/management-state/bin` to the `PATH` environment variable.Binaries permissions:Correct the permission of the binaries `/usr/bin/rancher-machine`, `/usr/bin/helm_v3`, and `/usr/bin/kustomize` so that they are owned by the root user.Improving Rancher jail security mechanism:A new group `jail-accessors` has been created, and the rancher user has been added to this group.The `jail-accessors` group is granted read and execute permissions for the directories `/var/lib/rancher`, `/var/lib/cattle`, and `/usr/local/bin`.The jail mechanism has been enhanced to execute commands using the non-root `rancher` user and the `jail-accessors` group. Additionally, a new setting, `UnprivilegedJailUser`, has been introduced to manage this behavior, allowing users to opt-out if they need to run drivers in a more privileged context.Limit the devices copied to the jail directory to a minimal set.Fixing node driver registration:The `NewPlugin(driver)` function in the `rancher/machine` module has been updated to allow setting the UID and GID for starting the plugin server. If the environment variables `MACHINE_PLUGIN_UID` and `MACHINE_PLUGIN_GID` are set, their values will be used to configure the user credentials for launching the plugin server.Rancher now sets these environment variables with a non-root UID and GID before invoking the `NewPlugin(driver)` function and then unsets them after retrieving the creation flags.Improvements on driver package:The `driver` package has been revised to verify that the downloaded driver binary is a regular file.The `driver` package has been revised to verify that the target file in the downloaded tar file is a regular file.The `driver` package now executes the downloaded driver binary within a jail, with a default timeout of 5 seconds.Other improvements:The helm package has been updated to ensure appropriate permissions are set on the generated kubeconfig file.The `nodeConfig` package has been updated to ensure proper permissions are applied when extracting the node configuration.Patched versions include releases `2.7.16`, `2.8.9` and `2.9.3`.WorkaroundsIf you can't upgrade to a fixed version, please make sure that:Drivers are only executed from trusted sources.The use of Admins/Restricted Admins is limited to trusted users.ReferencesIf you have any questions or comments about this advisory:Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
[]
null
9.1
null
null
GHSA-xp38-pxxv-x3pr
Cross-site scripting (XSS) vulnerability in htdocs/php.php in OpenConcept Back-End CMS 0.4.7 allows remote attackers to inject arbitrary web script or HTML via the page[] parameter.
[]
null
null
null
null
CVE-2019-19006
Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control.
[ "cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-89x4-gm7p-7fr8
Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a compressed GIF file, related to gifcodec.cpp and gifimage.cpp.
[]
null
null
null
null
CVE-2016-10990
The wp-cerber plugin before 2.7 for WordPress has XSS via the X-Forwarded-For HTTP header.
[ "cpe:2.3:a:wpcerber:cerber_security_antispam_\\&_malware_scan:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
CVE-2014-8456
Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8445, CVE-2014-8446, CVE-2014-8447, CVE-2014-8458, CVE-2014-8459, CVE-2014-8461, and CVE-2014-9158.
[ "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*" ]
null
null
null
10