id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-pfm3-rvf7-h49f | Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4769. | [] | null | null | null | null |
|
GHSA-qr9x-29jh-mg6x | A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way. | [] | null | 9.8 | null | null |
|
RHSA-2023:1472 | Red Hat Security Advisory: thunderbird security update | nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
CVE-2022-25848 | Directory Traversal | This affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory. | [
"cpe:2.3:a:static-dev-server_project:static-dev-server:1.0.0:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null |
CVE-2010-1143 | Cross-site scripting (XSS) vulnerability in VMware View (formerly Virtual Desktop Manager or VDM) 3.1.x before 3.1.3 build 252693 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-rr66-qh5m-w6mx | hutool Buffer Overflow vulnerability | hutool v5.8.21 was discovered to contain a buffer overflow via the component `JSONUtil.parse()`. | [] | null | 7.5 | null | null |
CVE-2009-1122 | The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535. | [
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-43825 | Relative path traversal vulnerability in Shihonkanri Plus Ver9.0.3 and earlier allows a local attacker to execute an arbitrary code by having a legitimate user import a specially crafted backup file of the product.. | [
"cpe:2.3:a:ekakin:shihonkanri_plus:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2024-13655 | Flex Mag - Responsive WordPress News Theme <= 3.5.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Option Deletion | The Flex Mag - Responsive WordPress News Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the propanel_of_ajax_callback() function in all versions up to, and including, 3.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary option values on the WordPress site. This can be leveraged to delete an option that would create an error on the site and deny service to legitimate users. | [] | null | 8.1 | null | null |
GHSA-6wm6-vgw4-6ghw | The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.5 does not have authorisation and CSRF checks in the updateIpAddress AJAX action, allowing any authenticated user to call it, or make a logged in user do it via a CSRF attack and add an arbitrary IP address to exclude. Furthermore, due to the lack of validation, sanitisation and escaping, users could set a malicious value and perform Cross-Site Scripting attacks against logged in admin | [] | null | 5.4 | null | null |
|
GHSA-9p26-698r-w4hx | BuildKit vulnerable to possible panic when incorrect parameters sent from frontend | ImpactA malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic.PatchesThe issue has been fixed in v0.12.5WorkaroundsAvoid using BuildKit frontends from untrusted sources. A frontend image is usually specified as the `#syntax` line on your Dockerfile, or with `--frontend` flag when using `buildctl build` command.References | [] | null | 5.3 | null | null |
GHSA-mgg9-8rr9-rq8w | WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001. | [] | null | null | null | null |
|
ICSA-22-314-03 | Siemens SINEC Network Management System Logback Component | In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. | [] | null | 6.6 | null | null |
CVE-2014-3515 | The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3c2r-59vj-vq75 | An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34197514. References: B-RB#112600. | [] | null | null | 7 | null |
|
GHSA-wcf6-mpx8-r44r | An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672. | [] | null | null | null | null |
|
GHSA-wgw2-wwq8-c7wf | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296. | [] | null | null | 7.5 | null |
CVE-2021-32858 | esdoc-publish-html-plugin vulnerable to Cross-site Scripting | esdoc-publish-html-plugin is a plugin for the document maintenance software ESDoc. TheHTML sanitizer in esdoc-publish-html-plugin 1.1.2 and prior can be bypassed which may lead to cross-site scripting (XSS) issues. There are no known patches for this issue. | [
"cpe:2.3:a:esdoc:esdoc-publish-html-plugin:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2023-48754 | WordPress Delete Post Revisions In WordPress Plugin <= 4.6 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Wap Nepal Delete Post Revisions In WordPress allows Cross Site Request Forgery.This issue affects Delete Post Revisions In WordPress: from n/a through 4.6.
| [
"cpe:2.3:a:wapnepal:delete_post_revisions:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-ph3v-m9mc-6c3f | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. | [] | null | null | null | null |
|
CVE-2001-0659 | Buffer overflow in IrDA driver providing infrared data exchange on Windows 2000 allows attackers who are physically close to the machine to cause a denial of service (reboot) via a malformed IrDA packet. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-2538 | Vulnerability in the Oracle Managed File Transfer component of Oracle Fusion Middleware (subcomponent: MFT Runtime Server). Supported versions that are affected are 19.1.0.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Managed File Transfer. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Managed File Transfer accessible data as well as unauthorized read access to a subset of Oracle Managed File Transfer accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). | [
"cpe:2.3:a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:managed_file_transfer:19.1.0.0.0:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.5 |
|
CVE-2023-34290 | Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-18007. | [
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2010-1008 | Cross-site scripting (XSS) vulnerability in the Sellector.com Widget Integration (chsellector) extension before 0.1.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:christian_hennecke:chsellector:*:*:*:*:*:*:*:*",
"cpe:2.3:a:christian_hennecke:chsellector:0.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2017:0213 | Red Hat Security Advisory: nagios security update | snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 7.3 | null |
GHSA-74mw-mv5r-fgg8 | IBM Maximo Asset Management 7.1, 7.5, and 7.6 could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL request, which could allow the attacker to execute arbitrary code on the vulnerable server. IBM X-Force ID: 120252. | [] | null | null | 8.4 | null |
|
GHSA-gf4f-cr5f-q363 | The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function. | [] | null | null | null | null |
|
CVE-2025-23625 | WordPress Unique UX plugin <= 0.9.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AWcode, PDSonline Unique UX allows Reflected XSS. This issue affects Unique UX: from n/a through 0.9.2. | [] | null | 7.1 | null | null |
CVE-2024-13010 | WP Foodbakery <= 4.7 - Reflected Cross-Site Scripting | The WP Foodbakery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 4.7 due to insufficient input sanitization and output escaping on the 'search_type' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
GHSA-xpp6-8r3j-ww43 | Undertow Denial of Service vulnerability | A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected `0\r\n` termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios. | [] | 8.7 | 7.5 | null | null |
RHSA-2010:0583 | Red Hat Security Advisory: tomcat5 security update | tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header | [
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
CVE-2021-47434 | xhci: Fix command ring pointer corruption while aborting a command | In the Linux kernel, the following vulnerability has been resolved:
xhci: Fix command ring pointer corruption while aborting a command
The command ring pointer is located at [6:63] bits of the command
ring control register (CRCR). All the control bits like command stop,
abort are located at [0:3] bits. While aborting a command, we read the
CRCR and set the abort bit and write to the CRCR. The read will always
give command ring pointer as all zeros. So we essentially write only
the control bits. Since we split the 64 bit write into two 32 bit writes,
there is a possibility of xHC command ring stopped before the upper
dword (all zeros) is written. If that happens, xHC updates the upper
dword of its internal command ring pointer with all zeros. Next time,
when the command ring is restarted, we see xHC memory access failures.
Fix this issue by only writing to the lower dword of CRCR where all
control bits are located. | [] | null | null | null | null |
CVE-2006-1747 | PHP remote file inclusion vulnerability in Virtual War (VWar) 1.5.0 allows remote attackers to execute arbitrary PHP code via a URL in the vwar_root parameter to (1) admin/admin.php, (2) war.php, (3) stats.php, (4) news.php, (5) joinus.php, (6) challenge.php, (7) calendar.php, (8) member.php, (9) popup.php, and other unspecified scripts in the admin folder. NOTE: these are different attack vectors than CVE-2006-1636 and CVE-2006-1503. | [
"cpe:2.3:a:vwar:virtual_war:1.5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-0866 | The Check & Log Email plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 1.0.9 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement. | [
"cpe:2.3:a:checkmail:check_and_log_email:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
ICSA-22-123-01 | Yokogawa CENTUM and ProSafe-RS | A local attacker could tamper with files generated by the graphic builder, which may allow arbitrary programs to be executed on a computer that has installed standard operation and monitoring function (HIS).CVE-2022-27188 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H). Improper authentication of the communication protocol provided by the Automation Design (AD) server allows an attacker to use the functions provided by the AD server. This may lead to leakage or tampering of data managed by the AD server.CVE-2022-26034 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2019-0203 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2018-11782 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2015-0248 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [] | null | null | 5.3 | null |
CVE-2021-41296 | ECOA BAS controller - Weak Password Requirements | ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system. | [
"cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2021-31791 | In Hardware Sentry KM before 10.0.01 for BMC PATROL, a cleartext password may be discovered after a failure or timeout of a command. | [
"cpe:2.3:a:sentrysoftware:hardware_sentry_km_for_bmc_patrol:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2006-6161 | Multiple SQL injection vulnerabilities in Doug Luxem Liberum Help Desk 0.97.3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) uid parameter to (a) inout/status.asp, (b) inout/update.asp, and (c) forgotpass.asp. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:doug_luxem:liberum_help_desk:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-56748 | scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() | In the Linux kernel, the following vulnerability has been resolved:
scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()
Hook "qed_ops->common->sb_init = qed_sb_init" does not release the DMA
memory sb_virt when it fails. Add dma_free_coherent() to free it. This
is the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb(). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2016-3489 | Unspecified vulnerability in the Data Pump Import component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 |
|
CVE-2020-3381 | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | A vulnerability in the web management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct directory traversal attacks and obtain read and write access to sensitive files on a targeted system. The vulnerability is due to a lack of proper validation of files that are uploaded to an affected device. An attacker could exploit this vulnerability by uploading a crafted file to an affected system. An exploit could allow the attacker to view or modify arbitrary files on the targeted system. | [
"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
RHSA-2014:1040 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 security update | RESTEasy: XXE via parameter entities | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2017:1647 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 2.9 | null |
GHSA-w2cf-f7gp-7p29 | demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to "class mismatching" and the MKV_IS_ID macro. | [] | null | null | null | null |
|
CVE-2011-1216 | Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7. | [
"cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:3.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:3.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.6.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:4.6.7h:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.6a.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.1:cf1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.1:cf2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.1:cf3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.2:cf1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.2:cf2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-2277 | WG-C10 v3.0.79 and earlier allows an attacker to bypass access restrictions to obtain or alter information stored in the external storage connected to the product via unspecified vectors. | [
"cpe:2.3:o:sony:wg-c10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:wg-c10:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | 7.5 |
|
CVE-2016-3680 | Buffer overflow in the Wi-Fi driver in Huawei Mate 8 NXT-AL before NXT-AL10C00B182, NXT-CL before NXT-CL00C92B182, NXT-DL before NXT-DL00C17B182, and NXT-TL before NXT-TL00C01B182 allows attackers to cause a denial of service (crash) or possibly gain privileges via a crafted application, aka HWPSIRT-2016-03020. | [
"cpe:2.3:h:huawei:mate_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_8_firmware:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-1999-1548 | Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x can only handle 200 ARP requests per second allowing a denial of service attack to succeed with a flood of ARP requests exceeding that limit. | [
"cpe:2.3:h:cabletron:smartswitch_router_8000_firmware:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2004-1173 | Internet Explorer 6 allows remote attackers to bypass the popup blocker via the document object model (DOM) methods in the DHTML Dynamic HTML (DHTML) Editing Component (DEC) and Javascript that calls showModalDialog. | [
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2022:5948 | Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update | mariadb: Crash executing query with VIEW, aggregate and subquery mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used mysql: C API unspecified vulnerability (CPU Oct 2022) mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer mariadb: lack of validating the existence of an object prior to performing operations on the object mariadb: lack of proper validation of a user-supplied string before using it as a format specifier mariadb: CONNECT storage engine heap-based buffer overflow mariadb: assertion failure in Item_args::walk_arg mariadb: use-after-poison when complex conversion is involved in blob mariadb: server crash in create_tmp_table::finalize mariadb: server crash in component arg_comparator::compare_real_fixed mariadb: server crash at my_decimal::operator= mariadb: server crash at Field::set_default via specially crafted SQL statements mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c mariadb: crash via component Item_subselect::init_expr_cache_tracker mariadb: server crashes in query_arena::set_query_arena upon SELECT from view mariadb: assertion failures in decimal_bin_size mariadb: crash when using HAVING with NOT EXIST predicate in an equality mariadb: assertion failure in compare_order_elements mariadb: crash when using HAVING with IS NULL predicate in an equality mariadb: use-after-poison in Binary_string::free_buffer mariadb: crash in multi-update and implicit grouping mariadb: assertion failure in sql/item_func.cc mariadb: crash via window function in expression in ORDER BY mariadb: assertion failure in sql/item_cmpfunc.cc mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc mariadb: incorrect key in "dup value" error after long unique mariadb: use-after-poison in Binary_string::free_buffer mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
CVE-2022-46091 | Cross Site Scripting (XSS) vulnerability in the feedback form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter. | [
"cpe:2.3:a:online_flight_booking_management_system_project:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
CVE-2016-8391 | An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 |
|
CVE-2017-3485 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 |
|
GHSA-6826-vrr5-pj78 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks Forms allows Stored XSS.This issue affects CRM Perks Forms: from n/a through 1.1.4. | [] | null | 6.5 | null | null |
|
CVE-2007-5079 | Red Hat Enterprise Linux 4 does not properly compile and link gdm with tcp_wrappers on x86_64 platforms, which might allow remote attackers to bypass intended access restrictions. | [
"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2024-44185 | The issue was addressed with improved checks. This issue is fixed in tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2021-41182 | XSS in the `altField` option of the Datepicker widget | jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. | [
"cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:17.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:17.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:17.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:17.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:big_data_spatial_and_graph:23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_inventory_management:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:*",
"cpe:2.3:a:oracle:rest_data_services:22.1.1:*:*:*:-:*:*:*"
] | null | 6.5 | null | null |
CVE-2020-13702 | The Rolling Proximity Identifier used in the Apple/Google Exposure Notification API beta through 2020-05-29 enables attackers to circumvent Bluetooth Smart Privacy because there is a secondary temporary UID. An attacker with access to Beacon or IoT networks can seamlessly track individual device movement via a Bluetooth LE discovery mechanism. | [
"cpe:2.3:a:the_rolling_proximity_identifier_project:the_rolling_proximity_identifier:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-5vvh-22mv-pf93 | The client applications in 3CX on Windows, the 3CX app for iOS, and the 3CX application for Android through 2022-03-17 lack SSL certificate validation. | [] | null | 9.1 | null | null |
|
CVE-2023-3782 | DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response | DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response
| [
"cpe:2.3:a:squareup:okhttp-brotli:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2014-2033 | The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials. | [
"cpe:2.3:o:bluecoat:proxysgos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:bluecoat:proxysgos:6.3:*:*:*:*:*:*:*"
] | null | null | null | 7.9 |
|
GHSA-rp7p-r22g-55vr | An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe. | [] | null | 7 | null | null |
|
GHSA-r68q-m8c2-v4c3 | Secure Boot Security Feature Bypass Vulnerability | [] | null | 4.1 | null | null |
|
CVE-2018-8179 | A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2014-6498 | Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3, 6.3.1, 6.3.2, 6.3.3, 6.3.4, and 6.3.5 allows remote attackers to affect confidentiality via unknown vectors related to Security. | [
"cpe:2.3:a:oracle:supply_chain_products_suite:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-j7qg-8r9m-wxm8 | All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information exposure allowing a remote, unauthenticated attacker to enumerate valid users. | [] | null | 5.3 | null | null |
|
CVE-2023-30285 | An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser. | [
"cpe:2.3:a:deviniti:issue_sync:*:*:*:*:*:jira:*:*"
] | null | 7.5 | null | null |
|
GHSA-6cxv-27r2-fp3m | Zenario CMS Cross-site Scripting vulnerability | A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout. | [] | null | 5.4 | null | null |
CVE-2023-23344 | HCL BigFix WebUI Insights is susceptible to a lack of sufficient authorization | A permission issue in BigFix WebUI Insights site version 14 allows an authenticated, unprivileged operator to access an administrator page.
| [
"cpe:2.3:a:hcltech:bigfix_webui_insights:14:*:*:*:*:*:*:*"
] | null | 3 | null | null |
CVE-2024-37920 | WordPress ARForms Form Builder plugin <= 1.6.7 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Repute InfoSystems ARForms Form Builder allows Reflected XSS.This issue affects ARForms Form Builder: from n/a through 1.6.7. | [] | null | 7.1 | null | null |
CVE-2010-1036 | Cross-site scripting (XSS) vulnerability in HP System Insight Manager before 6.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:hp:systems_insight_manager:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:*:update_1:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:2.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:4.2:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:systems_insight_manager:5.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2021:4107 | Red Hat Security Advisory: flatpak security update | flatpak: Sandbox bypass via recent VFS-manipulating syscalls | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
CVE-2023-33069 | Buffer Copy Without Checking Size of Input in Audio | Memory corruption in Audio while processing the calibration data returned from ACDB loader. | [
"cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:9206_lte_modem:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smart_audio_200_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_1200_wearable_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_1200_wearable_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
GHSA-5f33-7mw4-2v32 | Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by an out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | null | null | null |
|
CVE-2024-32084 | WordPress Before And After plugin <= 3.9 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Gold Plugins Before And After.This issue affects Before And After: from n/a through 3.9.
| [] | null | 4.3 | null | null |
CVE-2010-2897 | Google Chrome before 5.0.375.125 does not properly mitigate an unspecified flaw in the Windows kernel, which has unknown impact and attack vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2020-8734 | Improper input validation in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:m10jnp2sb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:m10jnp2sb:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2020-10423 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-feedbacks.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-6wv7-fpg8-f44q | Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck. | [] | null | null | null | null |
|
GHSA-c3h5-xmq3-3g76 | In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585. | [] | null | null | 5.5 | null |
|
GHSA-4g8c-wm8x-jfhw | SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine | ImpactWhen a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash.WorkaroundsAs workaround its possible to either disable the usage of the native SSLEngine or changing the code from:to: | [] | null | 7.5 | null | null |
GHSA-43jr-gj2x-p9c9 | Multiple cross-site scripting (XSS) vulnerabilities in the Colorbox Node module 7.x-2.x before 7.x-2.2 for Drupal allow remote attackers to inject arbitrary web script or HTML via unspecified parameters. | [] | null | null | null | null |
|
CVE-2024-13020 | code-projects Chat System chatroom.php sql injection | A vulnerability classified as critical was found in code-projects Chat System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/chatroom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2024-13265 | Opigno Learning path - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-029 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno Learning path allows PHP Local File Inclusion.This issue affects Opigno Learning path: from 0.0.0 before 3.1.2. | [] | null | 7.5 | null | null |
GHSA-hjh4-g6rp-f9g3 | An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1086, CVE-2019-1087. | [] | null | null | null | null |
|
ICSA-19-045-01 | Pangea Communications Internet FAX ATA | Using a specially crafted URL, an attacker can bypass user authentication to cause the device to reboot, which may be used to cause a continual denial-of-service condition.CVE-2019-6551 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 7.5 | null |
GHSA-453r-cx7v-94wr | A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product. | [] | null | null | null | null |
|
CVE-2018-5994 | SQL Injection exists in the JS Jobs 1.1.9 component for Joomla! via the zipcode parameter in a newest-jobs request, or the ta parameter in a view_resume request. | [
"cpe:2.3:a:joomsky:js_jobs:1.1.9:*:*:*:*:joomla\\!:*:*"
] | null | null | 9.8 | 7.5 |
|
ICSA-24-235-02 | Rockwell Automation 5015 - AENFTXT | An input validation vulnerability exists in the affected products when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product. | [] | null | 7.5 | null | null |
CVE-2020-2501 | Stack Buffer Overflow in Surveillance Station | A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS) | [
"cpe:2.3:a:qnap:surveillance_station:*:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:nas:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
GHSA-3q67-g228-h5qx | An access issue was addressed with additional sandbox restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, watchOS 6.2. Setting an alternate app icon may disclose a photo without needing permission to access photos. | [] | null | null | null | null |
|
CVE-2023-27465 | A vulnerability has been identified in SIMOTION C240 (All versions >= V5.4 < V5.5 SP1), SIMOTION C240 PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D445-2 DP/PN (All versions >= V5.4), SIMOTION D445-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D455-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION P320-4 E (All versions >= V5.4), SIMOTION P320-4 S (All versions >= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device. | [
"cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d425-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d425-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d435-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d435-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\)_firmware:5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d455-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_p320-4_e_firmware:5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_p320-4_e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_p320-4_s_firmware:5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d410-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d410-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_c240_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_c240:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
CVE-2011-3156 | Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1222. | [
"cpe:2.3:a:hp:data_protector_for_personal_computers:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_notebook_extension:6.20:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2013:1825 | Red Hat Security Advisory: php53 security update | php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:5.9"
] | null | null | null | null |
CVE-2015-0662 | Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, aka Bug ID CSCus79385. | [
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2005-0486 | Tarantella Secure Global Desktop Enterprise Edition 4.00 and 3.42, and Tarantella Enterprise 3 3.40 and 3.30, when using RSA SecurID and multiple users have the same username, reveals sensitive information during authentication, which allows remote attackers to identify valid usernames and the authentication scheme. | [
"cpe:2.3:a:tarantella:secure_global_desktop:enterprise_3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:secure_global_desktop:enterprise_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-h4pj-vffr-hw46 | A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf79346. | [] | null | null | 5.4 | null |
|
GHSA-c873-f884-8r22 | An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc. | [] | null | null | 5.5 | null |
|
GHSA-v2xm-98f2-h7c8 | IBM Flex System Manager (FSM) 1.1 through 1.3 before 1.3.2.0 allows remote attackers to enumerate user accounts via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-32048 | Improper input validation in the Intel(R) Distribution of OpenVINO(TM) Model Server software before version 2024.0 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [] | 6 | 6.5 | null | null |
Subsets and Splits