id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2013-3150
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3145.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-66j9-wx8r-qgqq
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1could allow an authenticated user to cause a denial of service when connecting to a z/OS database due to improper handling of automatic client rerouting.
[]
null
5.3
null
null
CVE-2017-18014
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.
[ "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "cpe:2.3:o:sophos:sfos:17.0:mr1:*:*:*:*:*:*", "cpe:2.3:o:sophos:sfos:17.0:mr2:*:*:*:*:*:*", "cpe:2.3:o:sophos:sfos:17.0:mr3:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2023-31410
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.
[ "cpe:2.3:a:sick:sick_eventcam_app:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2025-31560
WordPress Salon booking system plugin <= 10.11 - Privilege Escalation vulnerability
Incorrect Privilege Assignment vulnerability in Dimitri Grassi Salon booking system allows Privilege Escalation. This issue affects Salon booking system: from n/a through 10.11.
[]
null
7.2
null
null
GHSA-f924-xqm3-3544
Fuji Electric Monitouch V-SFT V8C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V8C files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24450.
[]
null
null
7.8
null
GHSA-727j-58h7-43f5
Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38648, CVE-2021-38649.
[]
null
7.8
null
null
GHSA-4h25-6mgv-2q43
Absolute path disclosure vulnerability in DM Corporative CMS. This vulnerability allows an attacker to view the contents of webroot/file, if navigating to a non-existent file.
[]
6.9
null
null
null
CVE-2002-1045
Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) via a malformed Date field that is converted into a year greater than 2037.
[ "cpe:2.3:a:ultrafunk:popcorn:1.20:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-47528
usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()
In the Linux kernel, the following vulnerability has been resolved: usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init() In cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep->ring and there is a dereference of it in cdnsp_endpoint_init(), which could lead to a NULL pointer dereference on failure of cdnsp_ring_alloc(). Fix this bug by adding a check of pep->ring. This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_USB_CDNSP_GADGET=y show no new warnings, and our static analyzer no longer warns about this code.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-g2fm-f89j-pxh3
The get_gallery_categories() and get_galleries() functions in the Photo Gallery by Ays – Responsive Image Gallery WordPress plugin before 4.4.4 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
[]
null
8.8
null
null
GHSA-rgpp-69xw-mj7q
Multiple cross-site request forgery (CSRF) vulnerabilities in API features in Cisco Unified MeetingPlace 8.6(1.9) allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus95884.
[]
null
null
null
null
CVE-2022-42797
An injection issue was addressed with improved input validation. This issue is fixed in Xcode 14.1. An app may be able to gain root privileges.
[ "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-22216
In default installations of Microchip maxView Storage Manager (for Adaptec Smart Storage Controllers) where Redfish server is configured for remote system management, unauthorized access can occur, with data modification and information disclosure. This affects 3.00.23484 through 4.14.00.26064 (except for the patched versions 3.07.23980 and 4.07.00.25339).
[ "cpe:2.3:a:microchip:maxview_storage_manager:*:*:*:*:*:-:*:*" ]
null
9.8
null
null
GHSA-f44g-qcvc-qmmq
Foxit PDF Editor transitionToState Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of the transitionToState method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14370.
[]
null
null
7.8
null
CVE-2024-22030
Rancher agents can be hijacked by taking over the Rancher Server URL
A vulnerability has been identified within Rancher that can be exploited in narrow circumstances through a man-in-the-middle (MITM) attack. An attacker would need to have control of an expired domain or execute a DNS spoofing/hijacking attack against the domain to exploit this vulnerability. The targeted domain is the one used as the Rancher URL.
[ "cpe:2.3:a:suse:rancher:-:*:*:*:*:*:*:*" ]
null
8
null
null
CVE-2023-3535
SimplePHPscripts FAQ Script PHP URL Parameter preview.php cross site scripting
A vulnerability was found in SimplePHPscripts FAQ Script PHP 2.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233287.
[ "cpe:2.3:a:simplephpscripts:faq_script_php:2.3:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
GHSA-wcrq-j35j-339c
Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
[]
null
null
null
null
GHSA-c72w-5qjp-5v3g
The WP Editor.MD plugin 1.6 for WordPress has a stored XSS vulnerability in the content of a post.
[]
null
null
6.1
null
GHSA-3m5q-q39v-xf8f
nocodb SQL Injection vulnerability
SummaryNocodb contains SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database.Productnocodb/nocodbTested Version[0.109.2](https://github.com/nocodb/nocodb/releases/tag/0.109.2)DetailsSQL injection in `SqliteClient.ts` (`GHSL-2023-141`)By supplying a specially crafted payload to the given below parameter and endpoint, an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injections, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database.The [`triggerList`](https://github.com/nocodb/nocodb/blob/3ec82824eeb2295f6b67fd67e7d6049784b41221/packages/nocodb/src/db/sql-client/lib/sqlite/SqliteClient.ts#L628-L654) method creates a SQL query using the user-controlled [`table_name`](https://github.com/nocodb/nocodb/blob/3ec82824eeb2295f6b67fd67e7d6049784b41221/packages/nocodb/src/db/sql-client/lib/sqlite/SqliteClient.ts#L637) parameter value from the [`tableCreate`](https://github.com/nocodb/nocodb/blob/3ec82824eeb2295f6b67fd67e7d6049784b41221/packages/nocodb/src/controllers/tables.controller.ts#L63) endpoint.ImpactThis issue may lead to `Information Disclosure`.CreditThis issue was discovered and reported by GHSL team member [@sylwia-budzynska (Sylwia Budzynska)](https://github.com/sylwia-budzynska).Disclosure PolicyThis report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).
[]
null
6.5
null
null
GHSA-pg36-pgm7-px54
Directory Traversal vulnerability in flusity CMS v.2.4 allows a remote attacker to execute arbitrary code and obtain sensitive information via the download_backup.php component.
[]
null
9.8
null
null
GHSA-7fx5-x28x-jw5r
Multiple Authenticated (contributor or higher user role) Stored Cross-Site Scripting (XSS) vulnerabilities in Nicdark d.o.o. Travel Management plugin <= 2.0 at WordPress.
[]
null
5.4
null
null
CVE-2003-0326
Integer overflow in parse_decode_path() of slocate may allow attackers to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc.
[ "cpe:2.3:a:slocate:slocate:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-77jg-cpw9-73vg
Apache Cocoon Improper Restriction of XML External Entity Reference vulnerability
Improper Restriction of XML External Entity Reference vulnerability in Apache Cocoon. This issue affects Apache Cocoon: from 2.2.0 before 2.3.0.Users are recommended to upgrade to version 2.3.0, which fixes the issue.
[]
null
9.8
null
null
GHSA-wr74-2v66-57pp
phpMyFAQ vulnerable to stored Cross-site Scripting
phpMyFAQ prior to version 3.1.8 is vulnerable to stored Cross-site Scripting.
[]
null
5.4
null
null
CVE-2018-8164
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8120, CVE-2018-8124, CVE-2018-8166.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2021-40662
A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL.
[ "cpe:2.3:a:chamilo:chamilo:1.11.14:-:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2025-24610
WordPress Restrict Anonymous Access Plugin <= 1.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Christian Leuenberg, L.net Web Solutions Restrict Anonymous Access allows Stored XSS. This issue affects Restrict Anonymous Access: from n/a through 1.2.
[]
null
6.5
null
null
GHSA-2634-r3qf-xp6v
Google Chrome before 11.0.696.57 does not properly handle drop-down lists, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
[]
null
null
null
null
GHSA-f76m-gm5c-xx2m
In the Linux kernel, the following vulnerability has been resolved:net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnelsdst_cache_get() gives us a reference, we need to release it.Discovered by the ioam6.sh test, kmemleak was recently fixed to catch per-cpu memory leaks.
[]
null
null
null
null
CVE-2024-4197
Avaya IP Office One-X Portal File Upload Vulnerability
An unrestricted file upload vulnerability in Avaya IP Office was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1.
[ "cpe:2.3:a:avaya:ip_office:11.1.3.1:*:*:*:*:*:*:*" ]
null
9.9
null
null
CVE-2024-21913
Rockwell Automation Arena Simulation Vulnerable To Memory Corruption
A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code into the software by overstepping the memory boundaries, which triggers an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
[ "cpe:2.3:a:rockwellautomation:arena_simulation_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-xvvv-2v53-5hxv
Transient DOS while key unwrapping process, when the given encrypted key is empty or NULL.
[]
null
7.5
null
null
GHSA-42w2-v853-2q4q
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the attach_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2022-33925
Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An remote authenticated attacker could potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information.
[ "cpe:2.3:a:dell:wyse_management_suite:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2019-8084
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
[ "cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2017-11848
Internet Explorer in Microsoft Microsoft Windows 7 SP1, Windows Server 2008 SP2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to detect the navigation of the user leaving a maliciously crafted page, due to how page content is handled by Internet Explorer, aka "Internet Explorer Information Disclosure Vulnerability".
[ "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
4.3
4.3
CVE-2015-2757
The ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3 Patch 4 Hotfix 16 (9.3.416.4) allows remote authenticated users to cause a denial of service (database lock or license corruption) via unspecified vectors.
[ "cpe:2.3:a:mcafee:data_loss_prevention_endpoint:*:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-6vjj-45px-pwmv
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Emergency Response System). The supported version that is affected is 9.0.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Cruise Fleet Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
9.1
null
GHSA-wchj-88hf-ghm5
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user.
[]
null
8.8
null
null
GHSA-cp47-gcrh-fx43
Vulnerability in the Oracle Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: System Management). The supported version that is affected is Prior to 3.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Integrated Lights Out Manager (ILOM). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Integrated Lights Out Manager (ILOM). CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
CVE-2020-25925
Cross Site Scripting (XSS) in Webmail Calender in IceWarp WebClient 10.3.5 allows remote attackers to inject arbitrary web script or HTML via the "p4" field.
[ "cpe:2.3:a:icewarp:webclient:10.3.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
ICSA-23-047-06
Siemens Simcenter Femap before V2023.1
The affected application contains an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17745) The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17854)
[]
null
7.8
null
null
CVE-2016-7547
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface.
[ "cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-9wf6-6h7r-6q4w
net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
[]
null
null
null
null
CVE-2020-5393
In Appspace On-Prem through 7.1.3, an adversary can steal a session token via XSS.
[ "cpe:2.3:a:appspace:on-prem:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2014-7229
Unspecified vulnerability in Joomla! before 2.5.4 before 2.5.26, 3.x before 3.2.6, and 3.3.x before 3.3.5 allows attackers to cause a denial of service via unspecified vectors.
[ "cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-20872
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*" ]
null
4.8
null
null
GHSA-4ppr-x3rg-ccj6
Information disclosure in Network Services due to buffer over-read while the device receives DNS response.
[]
null
8.2
null
null
GHSA-qwvh-983v-7jrj
A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been rated as problematic. Affected by this issue is the function 0x8001E024 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.8
5.5
null
null
CVE-2025-5869
RT-Thread lwp_syscall.c sys_recvfrom memory corruption
A vulnerability, which was classified as critical, was found in RT-Thread 5.1.0. Affected is the function sys_recvfrom of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument from leads to memory corruption.
[]
8.6
8
8
7.7
CVE-2011-4642
mappy.py in Splunk Web in Splunk 4.2.x before 4.2.5 does not properly restrict use of the mappy command to access Python classes, which allows remote authenticated administrators to execute arbitrary code by leveraging the sys module in a request to the search application, as demonstrated by a cross-site request forgery (CSRF) attack, aka SPL-45172.
[ "cpe:2.3:a:splunk:splunk:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:splunk:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:splunk:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:splunk:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:splunk:4.2.4:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-fc7h-9m39-45qq
The NotificationX plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.2. This is due to missing or incorrect nonce validation on the generate_conversions() function. This makes it possible for unauthenticated attackers to generate conversions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2024-8449
PLANET Technology switch devices - Local users' passwords recovery through hard-coded credentials
Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password.
[ "cpe:2.3:a:planet_technology_corp:gs-4210-24pl4c_hardware_2.0:*:*:*:*:*:*:*:*", "cpe:2.3:a:planet_technology_corp:gs-4210-24pl4c_hardware_3.0:*:*:*:*:*:*:*:*", "cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:*" ]
null
6.8
null
null
CVE-2024-33019
Buffer Over-read in WLAN Host
Transient DOS while parsing the received TID-to-link mapping action frame.
[ "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-494h-rf5r-q9v4
The SecuPress Free — WordPress Security plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.5.1. This is due to missing or incorrect nonce validation on the secupress_blackhole_ban_ip() function. This makes it possible for unauthenticated attackers to block a user's IP via a forged request granted they can trick the user into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2025-1618
vTiger CRM index.php cross site scripting
A vulnerability has been found in vTiger CRM 6.4.0/6.5.0 and classified as problematic. This vulnerability affects unknown code of the file /modules/Mobile/index.php. The manipulation of the argument _operation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component.
[]
5.3
4.3
4.3
5
GHSA-rfw8-3q2w-42qv
IBM Curam Social Program Management 7.0.9 and 7.0.11 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 191942.
[]
null
null
null
null
CVE-2025-2219
LoveCards LoveCardsV2 image unrestricted upload
A vulnerability was found in LoveCards LoveCardsV2 up to 2.3.2 and classified as critical. This issue affects some unknown processing of the file /api/upload/image. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.9
7.3
7.3
7.5
CVE-2007-4863
SQL injection vulnerability in example.php in SAXON 5.4 allows remote attackers to execute arbitrary SQL commands via the template parameter.
[ "cpe:2.3:a:quirm:saxon:5.4:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2020-27917
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
CVE-2023-5038
Unauthenticated DoS
badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
[ "cpe:2.3:h:hanwhavision:ano-l6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l6082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ane-l6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l6082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l7082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ane-l7012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l7082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l7012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l7022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l7012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-c9022rv:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9000qb:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-7002vd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-8082vt:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9002vq:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9022v:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9031rv:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084qz:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084rqz:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9085rqz:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084qz1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084rqz1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9085rqz1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9322vqp:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-7082rvd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-12082rvd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6011:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6021:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ane-l6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ane-l7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-c9022rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9000qb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-7002vd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-8082vt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9002vq_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9022v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9031rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084qz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084rqz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9085rqz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084qz1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084rqz1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9085rqz1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9322vqp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-7082rvd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-12082rvd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6021_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6073r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6073r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6073r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6073r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6073r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6073r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6012r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6012r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6022r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6022r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6032r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6032r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6072r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6072r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6082r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6082r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6012r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6012r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6022r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6022r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6032r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6032r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6072r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6072r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6082r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6082r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6012r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6012r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6022r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6022r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6032r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6032r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6072r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6072r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6082r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6082r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6014r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6014r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6084r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6084r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6014r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6014r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6084r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6084r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6024rm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6024rm:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6023r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6023r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l6023r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l6023r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnb-8002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnb-8002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8010r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8010r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8011:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8020r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8020r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8021_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8021:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8030r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8030r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8080r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8080r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qne-8011r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qne-8011r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qne-8021r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qne-8021r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8010r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8010r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8020r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8020r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8030r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8030r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8080r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8080r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8010r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8010r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8020r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8020r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8030r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8030r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8080r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8080r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-9083rz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-9083rz:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8083rz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8083rz:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8083z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8083z:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6083rz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6083rz:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6083z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6083z:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-6002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-6002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-6083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-6083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-6003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-6003:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8093r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8093r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-9083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-9083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8093rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8093rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-9003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-9003:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-8003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-8003:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c6083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c6083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c7083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c7083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c7083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c7083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c7083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c7083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c6083_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c6083:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c8083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c8083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c9083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c9083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-9250r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-9250r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-8250r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-8250r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-9250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-9250:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-8250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-6400r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-6400r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-9300rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-9300rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-8300rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-8300rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-6400rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-6400rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:tnv-c7013rc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:tnv-c7013rc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c6403_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c6403:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c6403r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c6403r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c6403rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c6403rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c8253_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c8253:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c8253r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c8253r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c8303rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c8303rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9253_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9253:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9253r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9253r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9303rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9303rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-6123r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-6123r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6123r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6123r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-8002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-8002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-9002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-9002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8082rf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8082rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8082rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8082rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-9082rf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-9082rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-9082rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-9082rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-8082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-8082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-9082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-9082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-9082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-9082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9310r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9310r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9010rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9010rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9010rvm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9010rvm:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9010rs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9010rs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9013rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9013rv:-:*:*:*:*:*:*:*" ]
8.7
null
null
null
ICSA-15-006-01
Eaton Cooper Power Series Form 6 Control and Idea/IdeaPlus Relays with Ethernet Vulnerability
Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
[]
null
null
null
null
CVE-2013-0836
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.13.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2014-4815
Session fixation vulnerability in IBM Rational Lifecycle Integration Adapter for Windchill 1.x before 1.0.1 allows remote attackers to hijack web sessions via unspecified vectors.
[ "cpe:2.3:a:ibm:_ibm_rational_lifecycle_integration_adapter_for_windchill:1.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2018-5838
Improper Validation of Array Index In the adreno OpenGL driver in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear, an out-of-bounds access can occur in SurfaceFlinger.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
GHSA-vw47-58pm-68j7
The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.6.45 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
null
6.4
null
null
GHSA-w8ch-5phg-59pf
WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors.
[]
null
null
9.8
null
GHSA-h67g-v778-vp3r
Multiple cross-site scripting (XSS) vulnerabilities in AirMagnet Enterprise before 7.5 build 6307 allow remote attackers to inject arbitrary web script or HTML via (1) the 404 error page of the Smart Sensor Edge Sensor; (2) the user name for a failed logon, when displayed in the audit journals reviewing interface (/AirMagnetSensor/AMSensor.dll/XH) by the Smart Sensor Edge Sensor log viewer; and (3) an SSID of an AP, when displayed on an ACL page (/Amom/Amom.dll/BD) of the Enterprise Server Status Overview in the Enterprise Server Web interface.
[]
null
null
null
null
GHSA-9ch6-prj4-mf5v
IBM Edge 4.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 189441.
[]
null
null
null
null
CVE-2016-1019
Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016.
[ "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2004-0575
Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.
[ "cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*" ]
null
null
null
10
GHSA-hc2r-g3jp-hcc7
Cross-Site Request Forgery (CSRF) vulnerability in Antsanchez Easy Cookie Law plugin <= 3.1 versions.
[]
null
5.4
null
null
ICSA-20-287-02
LCDS LAquis SCADA
An attacker who convinces a valid user to open a specially crafted project file to exploit could execute code under the privileges of the application due to an out-of-bounds read vulnerability.CVE-2020-25188 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
RHSA-2021:0299
Red Hat Security Advisory: thunderbird security update
Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
GHSA-49rq-hwc3-x77w
TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize
ImpactNPE in QuantizedMatMulWithBiasAndDequantize with MKL enablePatchesWe have patched the issue in GitHub commit [8a47a39d9697969206d23a523c977238717e8727](https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727).The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by r3pwnx
[]
null
7.5
null
null
CVE-2020-23715
Directory Traversal vulnerability in Webport CMS 1.19.10.17121 via the file parameter to file/download.
[ "cpe:2.3:a:webport_cms_project:webport_cms:1.19.10.17121:*:*:*:*:*:*:*" ]
null
8.6
null
5
CVE-2022-38256
TastyIgniter v3.5.0 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[ "cpe:2.3:a:tastyigniter:tastyigniter:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2024-4961
D-Link DAR-7000-40 onlineuser.php unrestricted upload
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DAR-7000-40 V31R02B1413C. Affected by this vulnerability is an unknown functionality of the file /user/onlineuser.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264529 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
[]
5.3
6.3
6.3
6.5
GHSA-m3xv-x3ph-mq22
Server-side Template Injection in nystudio107/craft-seomatic
A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header.
[]
null
9.8
null
null
CVE-2023-47838
WordPress Conditional Fields for Contact Form 7 plugin <= 2.4.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in Jules Colle Conditional Fields for Contact Form 7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Conditional Fields for Contact Form 7: from n/a through 2.4.1.
[]
null
4.3
null
null
CVE-2024-43754
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could allow an attacker to execute arbitrary code in the context of the victim's browser. This issue occurs when data from a malicious source is processed by a web application's client-side scripts to update the DOM. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
CVE-2001-1323
Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
[ "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-95rw-gm23-wxwq
Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
[]
null
null
9.8
null
CVE-2016-6132
The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
[ "cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-3ggg-wrvv-9653
na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 allows local users to gain Unix shell access via "`" (backtick) characters in the appliance's command line interface (CLI).
[]
null
null
null
null
CVE-2020-26199
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in multiple log files. A local authenticated attacker with access to the log files may use the exposed password to gain access with the privileges of the compromised user.
[ "cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_unity_vsa_operating_environment:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_unity_xt_operating_environment:*:*:*:*:*:*:*:*" ]
null
6.4
null
null
ICSA-21-159-12
Siemens Simcenter Femap
The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27399. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12819) The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27387. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12820)
[]
null
7.8
null
null
GHSA-52q6-3x8h-v328
Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
8.8
null
null
CVE-2018-2908
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via RPC to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
[ "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
null
null
7.7
6.8
CVE-2013-3927
Unspecified vulnerability in the client library in Siemens COMOS 9.2 before 9.2.0.6.10 and 10.0 before 10.0.3.0.4 allows local users to obtain unintended write access to the database by leveraging read access.
[ "cpe:2.3:a:siemens:comos:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:comos:10.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-9g57-m5vf-qp73
Liferay Portal and Liferay DXP Vulnerable to Cross-Site Scripting (XSS) via Asset Module Parameter
Cross-site scripting (XSS) vulnerability in the Asset module's category selector input field in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_asset_categories_admin_web_portlet_AssetCategoriesAdminPortlet_title parameter.
[]
null
6.1
null
null
CVE-2023-47160
IBM Cognos Controller XML external entity injection
IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
[]
null
8.2
null
null
GHSA-cwh7-7597-4728
Cross-site scripting (XSS) vulnerability in the Exif module 5.x-1.x before 5.x-1.2 and 6.x-1.x-dev before April 13, 2009, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via EXIF tags in an image.
[]
null
null
null
null
CVE-2022-31353
Online Car Wash Booking System v1.0 is vulnerable to SQL Injection via /ocwbs/admin/services/view_service.php?id=.
[ "cpe:2.3:a:online_car_wash_booking_system_project:online_car_wash_booking_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2007-0899
There is a possible heap overflow in libclamav/fsg.c before 0.100.0.
[ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2004-1854
Buffer overflow in the logging function in Picophone 1.63 and earlier allows remote attackers to execute arbitrary code via a large packet.
[ "cpe:2.3:a:picophone:internet_telephone:1.63:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2007-5856
Quick Look Apple Mac OS X 10.5.1, when previewing an HTML file, does not prevent plug-ins from making network requests, which might allow remote attackers to obtain sensitive information.
[ "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*" ]
null
null
null
9.4
CVE-2024-2660
Vault TLS Cert Auth Method Did Not Correctly Validate OCSP Responses
Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. This vulnerability, CVE-2024-2660, affects Vault and Vault Enterprise 1.14.0 and above, and is fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11.
[]
null
6.4
null
null
CVE-2014-9448
Buffer overflow in Mini-stream RM-MP3 Converter 3.1.2.1.2010.03.30 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long string in a WAX file.
[ "cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1.2010.03.30:*:*:*:*:*:*:*" ]
null
null
null
7.5