id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-7279 | Optergy Proton/Enterprise devices have Hard-coded Credentials. | [
"cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:optergy:proton:*:*:*:*:*:*:*:*"
]
| null | null | 7.3 | 7.5 |
|
GHSA-35jv-74f7-vj2m | In impd_parse_split_drc_characteristic of impd_drc_static_payload.c there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116619337. | []
| null | 7.8 | null | null |
|
GHSA-x96r-v34q-q4vv | GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str(). | []
| null | null | 7.5 | null |
|
CVE-2007-5461 | Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag. | [
"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*"
]
| null | null | null | 3.5 |
|
CVE-2023-42013 | IBM UrbanCode Deploy information disclosure | IBM UrbanCode Deploy (UCD) 7.1 through 7.1.2.14, 7.2 through 7.2.3.7, and 7.3 through 7.3.2.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 265510. | [
"cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
RHSA-2019:0303 | Red Hat Security Advisory: runc security update | runc: Execution of malicious containers allows for container escape and access to host filesystem | [
"cpe:/a:redhat:rhel_extras_other:7"
]
| null | null | 7.7 | null |
GHSA-224x-44xc-3gcf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
| null | null | null | null |
|
CVE-2019-1943 | Cisco Small Business Series Switches Open Redirect Vulnerability | A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites. | [
"cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08pp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mpp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10pp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mpp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24pp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48pp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28pp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-08_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48p_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10p_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28p_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24p_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-20_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08p_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24mp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10sfp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28mp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52p_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52mp_firmware:1.3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*"
]
| null | null | 4.7 | null |
CVE-2021-44567 | An unauthenticated SQL Injection vulnerability exists in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php. | [
"cpe:2.3:a:rosariosis:rosariosis:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2017-2140 | Tablacus Explorer 17.3.30 and earlier allows arbitrary scripts to be executed in the context of the application due to specially crafted directory. | [
"cpe:2.3:a:gaku:tablacus_explorer:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2021-40288 | A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames | [
"cpe:2.3:o:tp-link:archer_ax10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:archer_ax10:v1:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
RHSA-2023:4340 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | Controller: Html injection in custom login info | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9"
]
| null | 7.3 | null | null |
GHSA-4363-m599-g24f | An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821. | []
| null | null | 6.5 | null |
|
CVE-2019-2671 | Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:crm_technical_foundation:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.2.8:*:*:*:*:*:*:*"
]
| null | null | 8.2 | 5.8 |
|
GHSA-cj96-qrcp-8ffp | Buffer Overflow vulnerability in Control de Ciber version 1.650, in the printing function. Sending a modified request by the attacker could cause a Buffer Overflow when the adminitrator tries to accept or delete the print query created by the request. | []
| null | 8.8 | null | null |
|
CVE-2006-5890 | SQL injection vulnerability in detail.asp in Superfreaker Studios USupport 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:superfreaker_studios:usupport:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-21198 | In remove_sdp_record of btif_sdp_server.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-245517503 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2006-7021 | PHP remote file inclusion vulnerability in manager/tools/link/dbinstall.php in Plume CMS 1.1.3 allows remote attackers to execute arbitrary PHP code via a URL in the _PX_config[manager_path] parameter. | [
"cpe:2.3:a:plume-cms:plume_cms:1.1.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-47652 | WordPress Auto Affiliate Links Plugin <= 6.4.2.4 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate Links allows Stored XSS.This issue affects Auto Affiliate Links: from n/a through 6.4.2.4.
| [
"cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*"
]
| null | 7.1 | null | null |
CVE-2021-21326 | Horizontal Privilege Escalation | GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 it is possible to create tickets for another user with self-service interface without delegatee systems enabled. This is fixed in version 9.5.4. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
]
| null | 7.7 | null | null |
GHSA-ch9m-4jxr-g98q | UCMS v1.6.0 contains an authentication bypass vulnerability which is exploited via cookie poisoning. | []
| null | 9.8 | null | null |
|
CVE-2010-2035 | Directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. | [
"cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2023:4074 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 8.8 | null | null |
GHSA-wvx9-6xxp-wmvx | SQL injection vulnerability in NotifyLink before 3.0 allows remote attackers to execute arbitrary SQL commands via the URL. | []
| null | null | null | null |
|
GHSA-cf67-p57q-gjjc | Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job. | []
| null | null | null | null |
|
CVE-2021-25774 | In JetBrains TeamCity before 2020.2.1, a user could get access to the GitHub access token of another user. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4 |
|
CVE-2023-37258 | DataEase has a SQL injection vulnerability that can bypass blacklists | DataEase is an open source data visualization analysis tool. Prior to version 1.18.9, DataEase has a SQL injection vulnerability that can bypass blacklists. The vulnerability has been fixed in v1.18.9. There are no known workarounds. | [
"cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
RHSA-2003:228 | Red Hat Security Advisory: : : : Updated xinetd packages fix denial-of-service attacks and other bugs | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
]
| null | null | null | null |
CVE-2007-6007 | Integer overflow in the ID_PSP.apl plug-in for ACD ACDSee Photo Manager 9.0 build 108, Pro Photo Manager 8.1 build 99, and Photo Editor 4.0 build 195 allows user-assisted remote attackers to execute arbitrary code via a crafted PSP image that triggers a heap-based buffer overflow. | [
"cpe:2.3:a:acdsee:photo_editor:4.0:build_195:*:*:*:*:*:*",
"cpe:2.3:a:acdsee:photo_manager:9.0:build_108:*:*:*:*:*:*",
"cpe:2.3:a:acdsee:pro_photo_manager:8.1:build_99:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-7w8h-97qm-v5g3 | Oracle Database 10g uses a NULL pDacl parameter when calling the SetSecurityDescriptorDacl function to create discretionary access control lists (DACLs), which allows local users to gain privileges. | []
| null | null | null | null |
|
GHSA-9737-ffv6-mv28 | NeDi 1.9C allows an authenticated user to inject PHP code in the System Files function on the endpoint /System-Files.php via the txt HTTP POST parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data. | []
| null | 9.9 | null | null |
|
GHSA-pw24-grch-f45v | SAP Hostcontrol does not require authentication for the SOAP SAPControl endpoint. This is SAP Security Note 2442993. | []
| null | null | 7.5 | null |
|
GHSA-pfv2-37f7-9m6w | Improper Verification of Cryptographic Signature in Nimbus JOSE+JWT | Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation. | []
| null | null | 7.5 | null |
CVE-2008-2984 | Cross-site scripting (XSS) vulnerability in backend/umleitung.php in CMReams CMS 1.3.1.1 Beta 2 allows remote attackers to inject arbitrary web script or HTML via the lang[be_red_text] parameter. | [
"cpe:2.3:a:cmreams:cmreams_cms:1.3.1.1:beta_2:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-wqf9-7q5f-3m2f | Buffer overflow in IBM Rational ClearCase through 7.1.2.12, 8.0.0.x before 8.0.0.9, and 8.0.1.x before 8.0.1.2 allows local users to gain privileges via unspecified vectors. | []
| null | null | null | null |
|
CVE-2023-21643 | Untrusted Pointer Dereference in Automotive | Memory corruption due to untrusted pointer dereference in automotive during system call. | [
"cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
GHSA-7gm5-m2xc-vh2j | A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications. | []
| null | 4.7 | null | null |
|
GHSA-jfmw-22wh-9p3p | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17809. | []
| null | 7.8 | null | null |
|
CVE-2023-0811 |
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.
| [
"cpe:2.3:o:omron:sysmac_cj2h-cpu64_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu64:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu64-eip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu64-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu65-eip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu65-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu66_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu66:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu66-eip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu66-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu67_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu67:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu67-eip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu67-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu68_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu68:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2h-cpu68-eip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2h-cpu68-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu11_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu13_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu14_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu15_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu32_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu33_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu33:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu34_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu34:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cj2m-cpu35_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cj2m-cpu35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e10dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e10dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e10dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e10dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e10dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e10dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e10dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e10dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e10dt1-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e10dt1-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e10dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e10dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e14dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e14dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e14sdr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e14sdr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e20dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e20dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e20sdr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e20sdr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e30dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e30dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e30sdr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e30sdr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e40sdr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e40sdr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-e60sdr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-e60sdr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-na20dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-na20dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-na20dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-na20dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1e-na20dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1e-na20dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-x40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-x40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-x40dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-x40dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-x40dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-x40dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-xa40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-xa40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-xa40dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-xa40dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-xa40dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-xa40dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1h-y20dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1h-y20dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-el20dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-el20dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-em30dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-em30dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-em30dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-em30dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-em30dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-em30dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-em40dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-em40dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-em40dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-em40dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-em40dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-em40dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l10dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l10dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l10dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l10dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l10dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l10dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l10dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l10dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l10dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l10dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l14dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l14dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l14dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l14dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l14dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l14dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l14dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l14dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l14dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l14dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l20dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l20dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l20dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l20dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l20dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l20dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l20dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l20dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-l20dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-l20dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m30dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m30dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m30dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m30dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m30dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m30dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m30dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m30dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m30dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m30dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m40dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m40dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m40dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m40dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m40dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m40dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m40dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m40dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m60dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m60dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m60dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m60dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m60dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m60dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m60dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m60dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp1l-m60dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp1l-m60dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-e14dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-e14dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-e20dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-e20dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-e30dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-e30dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-e40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-e40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-e60dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-e60dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n14dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n14dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n14dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n14dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n14dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n14dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n14dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n14dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n14dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n14dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n20dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n20dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n20dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n20dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n20dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n20dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n20dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n20dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n20dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n20dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n30dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n30dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n30dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n30dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n30dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n30dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n30dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n30dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n30dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n30dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n40dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n40dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n40dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n40dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n40dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n40dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n40dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n40dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n60dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n60dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n60dr-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n60dr-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n60dt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n60dt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n60dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n60dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-n60dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-n60dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s30dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s30dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s30dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s30dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s30dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s30dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s40dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s40dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s40dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s40dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s40dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s40dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s60dr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s60dr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s60dt-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s60dt-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cp2e-s60dt1-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cp2e-s60dt1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-drm21-v1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-drm21-v1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-eip21_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-eip21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-etn21_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-etn21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-fln22_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-fln22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-nc\\[\\]71_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-nc\\[\\]71:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-spu01-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-spu01-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:sysmac_cs1w-spu02-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:sysmac_cs1w-spu02-v2:-:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
|
CVE-2020-9199 | B2368-22 V100R001C00;B2368-57 V100R001C00;B2368-66 V100R001C00 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the LAN. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject commands to the target device. | [
"cpe:2.3:o:huawei:b2368-22_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:b2368-22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:b2368-57_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:b2368-57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:b2368-66_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:b2368-66:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | 7.7 |
|
GHSA-w2vg-jw6r-gqf6 | QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects. | []
| null | null | null | null |
|
CVE-2007-5052 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Vigile CMS 1.8 allow remote attackers to inject arbitrary web script or HTML via a request to the wiki module with (1) the title parameter or (2) a "title=" sequence in the PATH_INFO, or a request to the download module with (3) the cat parameter or (4) a "cat=" sequence in the PATH_INFO. | [
"cpe:2.3:a:itcms:vigile_cms:1.8:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
RHSA-2007:0244 | Red Hat Security Advisory: busybox security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
GHSA-xj34-5mxh-m7xc | Unspecified vulnerability in ImageIO in Apple Mac OS X 10.4.7 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image that triggers a memory allocation failure that is not properly handled. | []
| null | null | null | null |
|
CVE-2023-33538 | TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm . | [
"cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:8.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr740n:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr740n:2.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2024-0839 | The FeedWordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2022.0222 due to missing validation on the user controlled 'guid' key. This makes it possible for unauthenticated attackers to view draft posts that may contain sensitive information. | [
"cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:*"
]
| null | 5.3 | null | null |
|
CVE-2021-27796 | A vulnerability in Brocade Fabric OS versions before Brocade Fabric OS v8.0.1b, v7.4.1d could allow an authenticated attacker within the restricted shell environment (rbash) as either the “user” or “factory” account, to read the contents of any file on the filesystem utilizing one of a few available binaries. | [
"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 6.8 |
|
GHSA-mfvw-r6f7-mjcf | A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. | []
| null | null | null | null |
|
GHSA-9p2r-3443-pgvw | Cross-site scripting (XSS) vulnerability in index.php in Turnkey Ebook Store 1.1 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search action. | []
| null | null | null | null |
|
CVE-2019-2252 | Classic buffer overflow vulnerability while playing the specific video whose Decode picture buffer size is more than 16 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2017-7819 | A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2020-11149 | Out of bound access due to usage of an out-of-range pointer offset in the camera driver. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | [
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8909:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmc1000h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmd9655:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pme605:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm6155au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm8155au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmw3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4361:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5541:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5577:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5579:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm6325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm6375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw6310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtm527:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1357:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb2351:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr4905:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr5975:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | 7.2 |
|
CVE-2007-2222 | Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS. | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2009-3661 | Multiple SQL injection vulnerabilities in the DJ-Catalog (com_djcatalog) component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in a showItem action and (2) cid parameter in a show action to index.php. | [
"cpe:2.3:a:blueconstantmedia:com_djcatalog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2020-3187 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Path Traversal Vulnerability | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system. | [
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5510_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5520_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5540_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5550_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5585-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
]
| null | null | 9.1 | null |
CVE-2008-6807 | PHP remote file inclusion vulnerability in ListRecords.php in osprey 1.0a4.1 allows remote attackers to execute arbitrary PHP code via a URL in the xml_dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the lib_dir vector is already covered by CVE-2006-6630. | [
"cpe:2.3:a:ibiblio:osprey:1.0a4.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2019-2781 | Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: XML Interface). Supported versions that are affected are 8.9.6, 8.10.2 and 8.11-8.14. Easily exploitable vulnerability allows low privileged attacker with network access via TCP/IP to compromise Oracle Hospitality Suite8. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Suite8 accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_suite8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-qg7x-6q28-q3g3 | Cross Site Scripting vulnerability found in Simplcommerce v.40734964b0811f3cbaf64b6dac261683d256f961 thru 3103357200c70b4767986544e01b19dbf11505a7 allows a remote attacker to execute arbitrary code via a crafted script to the search bar feature. | []
| null | 7.1 | null | null |
|
RHSA-2017:3490 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support One-Year Notice | This is the One-Year notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7. | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
]
| null | null | null | null |
GHSA-jh82-8337-2954 | Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem. | []
| null | null | null | null |
|
CVE-2006-1577 | Multiple cross-site scripting (XSS) vulnerabilities in view_all_set.php in Mantis 1.0.1, 1.0.0rc5, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) start_day, (2) start_year, and (3) start_month parameters. | [
"cpe:2.3:a:mantis:mantis:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2018-1312 | In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection. | [
"cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 6.8 |
|
CVE-2019-12823 | Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS. | [
"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2023-43581 | A buffer overflow was reported in the Update_WMI module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code. | [
"cpe:2.3:a:lenovo:desktop_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5_14irb8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5_14irb8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_70t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_70t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_50t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_50t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:o5nkt33a:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920z_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920z_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90q_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90q_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90q_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90q_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_pro_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_pro_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80q_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80q_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m80q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m80q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75t_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75t_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75s_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75q_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75q_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70t_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70t_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70q_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70q_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70a_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70a_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:loq_17irb8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:loq_17irb8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t5_26iab7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t5_26iab7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t7-34iaz7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t7-34iaz7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t7_34irz8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t7_34irz8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t5_26irb8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t5_26irb8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_mini_5_01iaq7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_mini_5_01iaq7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_5_27iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_5_27iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_5_24iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_5_24iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-27imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-27imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_27iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_27iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_24iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_24iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_22iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_22iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3_21itl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3_21itl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-22iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-22itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-22itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-24iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-24itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-24itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50a-22imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50a-24imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50s-07imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13imb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13imh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13imh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13iob_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13iob:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_aio_7_27arh7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_aio_7_27arh7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_aio_7-27arh6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_aio_7-27arh6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkedge_se30_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p920_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p720_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520c_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520c_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p360_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_ultra_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p360_ultra_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p360_tiny_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p360_tiny_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p358_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p358_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p350_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p350_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p350_tiny_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p350_tiny_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p348_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p348_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p340_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p340_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p340_tiny_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p340_tiny_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p330_workstation_2nd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p330_workstation_2nd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p330_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p330_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p320_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p320_workstation:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
GHSA-gmr8-4xqw-xcqv | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tauhidul Alam Advanced Angular Contact Form allows Reflected XSS. This issue affects Advanced Angular Contact Form: from n/a through 1.1.0. | []
| null | 7.1 | null | null |
|
RHSA-2015:0235 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints | [
"cpe:/a:redhat:jboss_brms:6.0"
]
| null | null | 4.8 | null |
CVE-2021-20764 | Improper input validation vulnerability in Attaching Files of Cybozu Garoon 4.0.0 to 5.0.2 allows a remote attacker to alter the data of Attaching Files. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
GHSA-23gm-hjpg-qfp3 | ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector. | []
| null | 9.8 | null | null |
|
ICSA-15-293-02 | IniNet Solutions SCADA Web Server Vulnerabilities | Multiple stack-based buffer overflows in IniNet embeddedWebServer (aka eWebServer) before 2.02 allow remote attackers to execute arbitrary code via a long field in an HTTP request. IniNet embeddedWebServer (aka eWebServer) before 2.02 mishandles URL encoding, which allows remote attackers to write to or delete files via a crafted string. Directory traversal vulnerability in IniNet embeddedWebServer (aka eWebServer) before 2.02 allows remote attackers to read arbitrary files via a crafted pathname. | []
| null | null | 7.5 | null |
GHSA-vc99-rg67-mm68 | An out-of-memory error in the parseABC_STRING_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion. | []
| null | 7.5 | null | null |
|
CVE-2005-1870 | PHP remote file inclusion vulnerability in childwindow.inc.php in Popper 1.41-r2 and earlier allows remote attackers to execute arbitrary PHP code via the form parameter. | [
"cpe:2.3:a:popper:popper:1.41_r2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2024-7896 | Tosei Online Store Management System ネット店舗管理システム p1_ftpserver.php command injection | A vulnerability was found in Tosei Online Store Management System ネット店舗管理システム 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:tosei:online_store_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*"
]
| 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2024-30006 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
CVE-2019-13455 | In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the alert acknowledgment CGI tool because of expansion in acknowledge.c. | [
"cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2022-43363 | Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding. | [
"cpe:2.3:a:telegram:telegram:15.3.1:*:*:*:*:-:*:*"
]
| null | 6.1 | null | null |
|
CVE-2024-49553 | Media Encoder | Out-of-bounds Write (CWE-787) | Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-9w5m-5829-xj6c | Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, Compatibility Pack, and Office 2004 and 2008 for Mac allows user-assisted remote attackers to execute arbitrary code via malformed tags in rich text, aka "Excel Rich Text Validation Vulnerability." | []
| null | null | null | null |
|
GHSA-793v-2p67-gw99 | In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in ksmbd_session_rpc_openA UAF issue can occur due to a race condition between
ksmbd_session_rpc_open() and __session_rpc_close().
Add rpc_lock to the session to protect it. | []
| null | null | null | null |
|
GHSA-mxrj-wg4w-q89c | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Docpro allows PHP Local File Inclusion. This issue affects Docpro: from n/a through 2.0.1. | []
| null | 9.8 | null | null |
|
CVE-2022-27895 | A component in Foundry logging was found to be capturing sensitive information in logs. | Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater. | [
"cpe:2.3:a:palantir:foundry_build2:*:*:*:*:*:*:*:*"
]
| null | 4.2 | null | null |
GHSA-xw9h-mxp6-gf7c | A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | null | null |
|
GHSA-7w26-cm7p-4c6w | SQL injection vulnerability in search.php in Servous sBLOG 0.7.2 allows remote attackers to execute arbitrary SQL commands via the keyword parameter. NOTE: this issue can be used to trigger path disclosure. In addition, it might be primary to vector 1 in CVE-2006-1135. | []
| null | null | null | null |
|
GHSA-j87h-xx89-rh88 | SQL injection vulnerability in phpMyFAQ 1.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the userfile or filename parameter. | []
| null | null | null | null |
|
CVE-2006-0258 | Unspecified vulnerability in the Connection Manager component of Oracle Database server 8.1.7.4 and 9.0.1.5 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB03. | [
"cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-57q5-57f2-p23x | Opera before 11.62 allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain. | []
| null | null | null | null |
|
CVE-2005-1729 | Novell eDirectory 8.7.3 allows remote attackers to cause a denial of service (application crash) via a URL containing an MS-DOS device name such as AUX, CON, PRN, COM1, or LPT1. | [
"cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2022-0999 | mySCADA myPRO Command Injection | An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior. | [
"cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
GHSA-8fxr-4vx8-rh8m | In the Linux kernel, the following vulnerability has been resolved:cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()cpufreq_cpu_get_raw() can return NULL when the target CPU is not present
in the policy->cpus mask. scmi_cpufreq_get_rate() does not check for
this case, which results in a NULL pointer dereference.Add NULL check after cpufreq_cpu_get_raw() to prevent this issue. | []
| null | null | null | null |
|
ICSA-15-239-02 | Siemens SIMATIC S7-1200 CSRF Vulnerability | Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | []
| null | null | null | null |
GHSA-jr8p-xq33-3425 | A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the parameter of a specific GET request. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. | []
| null | 8.8 | null | null |
|
GHSA-c58v-2pgr-h7q6 | A vulnerability has been identified in SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions), SIMATIC S7-1200 CPU family (All versions >= V4.0), SIMATIC S7-1500 CPU family (All versions), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions). An attacker with network access to port 102/tcp could potentially modify the user program on the PLC in a way that the running code is different from the source code which is stored on the device. An attacker must have network access to affected devices and must be able to perform changes to the user program. The vulnerability could impact the perceived integrity of the user program stored on the CPU. An engineer that tries to obtain the code of the user program running on the device, can receive different source code that is not actually running on the device. No public exploitation of the vulnerability was known at the time of advisory publication. | []
| null | 7.5 | null | null |
|
GHSA-gg8p-p2xw-4wqr | Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges. | []
| null | null | null | null |
|
CVE-2016-3138 | The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*"
]
| null | null | 4.6 | 4.9 |
|
CVE-2017-1087 | In FreeBSD 10.x before 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24 named paths are globally scoped, meaning a process located in one jail can read and modify the content of POSIX shared memory objects created by a process in another jail or the host system. As a result, a malicious user that has access to a jailed system is able to abuse shared memory by injecting malicious content in the shared memory region. This memory region might be executed by applications trusting the shared memory, like Squid. This issue could lead to a Denial of Service or local privilege escalation. | [
"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
GHSA-w65x-2cwr-hcvq | The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function. | []
| null | null | null | null |
|
CVE-2021-32541 | SysJust CTS Web - Broken Access Control | The CTS Web transaction system related to authentication and session management is implemented incorrectly, which allows remote unauthenticated attackers can send a large number of valid usernames, and force those logged-in account to log out, causing the user to be unable to access the services | [
"cpe:2.3:a:sysjust:cts_web:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-53c4-fhgx-hg96 | Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution . | []
| null | null | null | null |
|
GHSA-2cpr-2355-gh3w | NVIDIA Virtual GPU Manager, all versions, contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service. | []
| null | null | null | null |
|
CVE-2025-2495 | Stored Cross-Site Scripting (XSS) vulnerability in Softdial Contact Center | Stored Cross-Site Scripting (XSS) in Softdial Contact Center of Sytel Ltd. This vulnerability allows an attacker to upload XML files to the server with JavaScript code injected via the ‘/softdial/scheduler/save.php’ resource. The injected code will execute when the uploaded file is loaded via the ‘/softdial/scheduler/load.php’ resource and can redirect the victim to malicious sites or steal their login information to spoof their identity. | []
| 5.3 | null | null | null |
CVE-2006-7077 | SQL injection vulnerability in guestbook.php in Advanced Guestbook 2.4 for phpBB allows remote attackers to execute arbitrary SQl commands via the entry parameter. | [
"cpe:2.3:a:phpbb_group:phpbb_advanced_guestbook:2.4.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.