id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9fw7-mcq9-ghf3 | ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords. | [] | null | null | 9.8 | null |
|
GHSA-x3gc-2q27-cx8r | 3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793. | [] | null | 7.8 | null | null |
|
GHSA-f3fq-q8w4-w2rr | Rejected reason: Not used | [] | null | null | null | null |
|
CVE-2023-38346 | An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior. | [
"cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-35958 | net: ena: Fix incorrect descriptor free behavior | In the Linux kernel, the following vulnerability has been resolved:
net: ena: Fix incorrect descriptor free behavior
ENA has two types of TX queues:
- queues which only process TX packets arriving from the network stack
- queues which only process TX packets forwarded to it by XDP_REDIRECT
or XDP_TX instructions
The ena_free_tx_bufs() cycles through all descriptors in a TX queue
and unmaps + frees every descriptor that hasn't been acknowledged yet
by the device (uncompleted TX transactions).
The function assumes that the processed TX queue is necessarily from
the first category listed above and ends up using napi_consume_skb()
for descriptors belonging to an XDP specific queue.
This patch solves a bug in which, in case of a VF reset, the
descriptors aren't freed correctly, leading to crashes. | [] | null | 5.5 | null | null |
GHSA-xg4x-58xv-5259 | SQL injection vulnerability in todos.php in C. Desseno YouTube Blog (ytb) 0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2008-3306. | [] | null | null | null | null |
|
GHSA-cv6c-2jmj-cr4h | Cross-Site Request Forgery (CSRF) vulnerability in wptom All-In-One Cufon allows Cross Site Request Forgery. This issue affects All-In-One Cufon: from n/a through 1.3.0. | [] | null | 4.3 | null | null |
|
GHSA-v7hj-fwhg-gxcv | Dell Secure Connect Gateway (SCG) version 5.14.00.12 contains a broken cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by performing MitM attacks and let attackers obtain sensitive information. | [] | null | 5.9 | null | null |
|
CVE-2010-4152 | SQL injection vulnerability in catalog/index.shtml in 4site CMS 2.6, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the cat parameter. NOTE: the i and th vectors are already covered by CVE-2009-0646. | [
"cpe:2.3:a:4site:4site_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:4site:4site_cms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:4site:4site_cms:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-12695 | The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. | [
"cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2022-24797 | Exposure of Sensitive Information in Pomerium | Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service. | [
"cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2007-0056 | Multiple cross-site scripting (XSS) vulnerabilities in AShop Deluxe 4.5 and AShop Administration Panel allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to (a) ashop/catalogue.php and (b) ashop/basket.php, the (2) exp parameter to ashop/catalogue.php, the (3) searchstring parameter to (c) ashop/search.php, the (4) checkout and (5) action parameters to (d) ashop/shipping.php, the cat parameter to (f) cart-path/admin/editcatalogue.php, and the (7) resultpage parameter to (g) cart-path/admin/salesadmin.php. | [
"cpe:2.3:a:ashopsoftware:ashop_administration_panel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ashopsoftware:ashop_deluxe:4.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-6v88-j2c7-5mr7 | Multiple PHP remote file inclusion vulnerabilities in SpiffyJr phpRaid 2.9.5 through 3.0.b3 allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter in (1) auth.php and (2) auth_phpbb when the phpBB portal is enabled, and via a URL in the smf_root_path parameter in (3) auth.php and (4) auth_SMF when the SMF portal is enabled. | [] | null | null | null | null |
|
CVE-2016-9222 | A vulnerability in the web-based management interface of Cisco NetFlow Generation Appliance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvb15229. Known Affected Releases: 1.0(2). | [
"cpe:2.3:a:cisco:netflow_generation_appliance:1.0\\(2\\):*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2009-2048 | Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors. | [
"cpe:2.3:a:cisco:crs:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:crs:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:crs:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:crs:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:crs:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:crs:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:crs:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:customer_response_applications:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ip_qm:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.0\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:4.5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:5.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:6.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ccx:7.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_contact_center_express:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_contact_center_express:5.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_contact_center_express:6.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_contact_center_express:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_ip_ivr:7.0\\(1\\):*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2022-33234 | Memory corruption in video due to configuration weakness. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | [
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
CVE-2021-45570 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | [
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
GHSA-xjmr-q9w7-m3w7 | Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42303. | [] | null | 6.6 | null | null |
|
ICSA-22-284-01 | Altair HyperView Player | The software performs operations on a memory buffer but can read from or write to a memory location outside of the intended boundary of the buffer. This hits initially as a read access violation, leading to a memory corruption situation.CVE-2022-2947 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.CVE-2022-2949 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.CVE-2022-2950 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to improper validation of array index vulnerability during processing of H3D files. A DWORD value from a PoC file is extracted and used as an index to write to a buffer, leading to memory corruption.CVE-2022-2951 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
| [] | null | null | 7.8 | null |
CVE-2021-30917 | A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-v9mx-4pqq-h232 | Bun has an Application-level Prototype Pollution vulnerability in the runtime native API for Glo | Versions of the package bun before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. | [] | 6.8 | 7.5 | null | null |
CVE-2023-27309 | A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.2). The client query handler of the affected application fails to check for proper permissions for specific write queries. This could allow an authenticated remote attacker to perform unauthorized actions. | [
"cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
|
GHSA-266r-h4p4-f6fp | Integer overflow for some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 2.4 | 4.8 | null | null |
|
CVE-2024-7329 | YouDianCMS image_upload.php unrestricted upload | A vulnerability, which was classified as critical, was found in YouDianCMS 7. Affected is an unknown function of the file /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php. The manipulation of the argument files leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273252. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:youdiancms:youdiancms:7.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-mc22-5q92-8v85 | Memory Safety Issue when using patch or merge on state and assign the result back to state | ImpactThis vulnerability is a memory safety Issue when using [`patch`](https://www.tremor.rs/docs/tremor-script/index#patch) or [`merge`](https://www.tremor.rs/docs/tremor-script/index#merge) on `state` and assign the result back to `state`.
In this case affected versions of Tremor and the [tremor-script crate](https://crates.io/crates/tremor-script) maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct.DetailsIf affects the following two tremor-script language constructs:A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression
and the expression to be merged needs to reference the `event`:A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression
and the patch operations used need to reference the `event`:For constructs like this (it does not matter what it references in the expression to be merged or the patch operations) an optimization
was applied to manipulate the target value in-place, instead of cloning it.Our `Value` struct, which underpins all event data in `tremor-script`, is representing strings as borrowed `beef::Cow<'lifetime, str>`,
that reference the raw data `Vec<u8>` the event is based upon. We keep this raw byte-array next to the `Value` structure inside our `Event` as a self-referential struct,
so we make sure that the structured `Value` and its references are valid across its whole lifetime.The optimization was considered safe as long as it was only possible to merge or patch `event` data or static data.
When `state` was introduced to `tremor-script` (in version 0.7.3) a new possibility to keep `Value` data around for longer than the lifetime of an event emerged.
If `event` data is merged or patched into `state` without cloning it first, it can still reference keys or values from
the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire.PatchesThe issue has been patched in https://crates.io/crates/tremor-script/0.11.6 and https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization
and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch.WorkaroundsIf an upgrade is not possible, a possible workaround is to avoid the optimization
by introducing a temporary variable and not immediately reassigning to `state`:ReferencesThe actual fix is applied in this PR: https://github.com/tremor-rs/tremor-runtime/pull/1217For more informationIf you have any questions or comments about this advisory:Open an issue on our repository [tremor-rs/tremor-runtime](https://github.com/tremor-rs/tremor-runtime)Please join our discord https://chat.tremor.rs and reach out to the team. | [] | null | 6.5 | null | null |
GHSA-9vw5-h5q2-qpc9 | A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351. | [] | null | 9.8 | null | null |
|
GHSA-mrfw-74xj-r24f | Buffer overflow in the RFC1413 (ident) client in cfingerd 1.4.3-3 allows remote IDENT servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted response. | [] | null | null | null | null |
|
RHSA-2009:1522 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netlink: fix numerous padding memleaks kernel: tc: uninitialised kernel memory leak kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7 | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-3cjr-x7x5-gqqh | The check_login function in login.php in Virtual Hosting Control System (VHCS) 2.4.7.1 and earlier does not exit when authentication fails, which allows remote attackers to gain unauthorized access. | [] | null | null | null | null |
|
GHSA-hxh6-gm53-6gm3 | A vulnerability, which was classified as problematic, has been found in Thecosy IceCMS up to 2.0.1. This issue affects some unknown processing of the component User Data Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247889 was assigned to this vulnerability. | [] | null | 4.3 | null | null |
|
CVE-2022-34851 | BIG-IP and BIG-IQ iControl SOAP vulnerability CVE-2022-34851 | In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, and BIG-IQ Centralized Management all versions of 8.x, an authenticated attacker may cause iControl SOAP to become unavailable through undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-g6vq-46f2-9g62 | A vulnerability in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect memory operations that the affected software performs when the software parses a username during login authentication. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device or cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are running Cisco IOS XE Software Release Fuji 16.7.1 or Fuji 16.8.1 and are configured to use AAA for login authentication. Cisco Bug IDs: CSCvi25380. | [] | null | 9.8 | null | null |
|
GHSA-fgxq-h4x2-h94p | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1094, CVE-2019-1095, CVE-2019-1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101. | [] | null | null | 6.5 | null |
|
CVE-2020-9857 | An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.5, Security Update 2020-003 Mojave, Security Update 2020-003 High Sierra. A malicious website may be able to exfiltrate autofilled data in Safari. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-446x-f9hh-hqmm | An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR. | [] | null | null | 5.5 | null |
|
CVE-2011-4966 | modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | [
"cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2008-3635 | Stack-based buffer overflow in QuickTimeInternetExtras.qtx in an unspecified third-party Indeo v3.2 (aka IV32) codec for QuickTime, when used with Apple QuickTime before 7.5.5 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file. | [
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:indeo:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2011-2674 | BaserCMS before 1.6.12 does not properly restrict additions to the membership of the operators group, which allows remote authenticated users to gain privileges via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:basercms:basercms:1.6.11.3:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-28qc-v7xx-3vpf | The Persian Fonts WordPress plugin through 1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 6.1 | null | null |
|
GHSA-frgj-vg7w-2jv6 | Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function. | [] | null | 9.8 | null | null |
|
GHSA-3r86-pp9h-4fh6 | Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user&id=. | [] | null | 8.8 | null | null |
|
GHSA-36ww-7vxr-9ggq | This affects the package s-cart/core before 4.4. The search functionality of the admin dashboard in core/src/Admin/Controllers/AdminOrderController.phpindex is vulnerable to XSS. | [] | null | null | null | null |
|
CVE-2017-13818 | An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-rvqh-qh4f-c556 | Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character. | [] | null | null | null | null |
|
GHSA-cgf3-cx8v-m6p5 | selectawasset.asp in Layton Helpbox 4.4.0 allows remote attackers to discover ODBC database credentials via an element=sys_asset_id request, which is not properly handled during construction of an error page. | [] | null | null | null | null |
|
GHSA-mp5p-42hx-3ghq | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | 7 | null | null |
|
CVE-2023-36573 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
CVE-2020-36752 | The Coming Soon & Maintenance Mode Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.57. This is due to missing or incorrect nonce validation on the save_meta_box() function. This makes it possible for unauthenticated attackers to save meta boxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:wpconcern:coming_soon_\\&_maintenance_mode_page:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
CVE-2023-22117 | Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-fvwg-j6fx-cf57 | See.sys through 4.25 in the SoftEther VPN Server allows a user to specify any kernel address to which arbitrary bytes are written. | [] | null | 7.8 | null | null |
|
CVE-2025-43703 | An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484. | [] | null | 6.1 | null | null |
|
RHSA-2024:3472 | Red Hat Security Advisory: rh-nodejs14 security update | nodejs: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
CVE-2023-37205 | The use of RTL Arabic characters in the address bar may have allowed for URL spoofing. This vulnerability affects Firefox < 115. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-8q64-j7wc-42px | SlackRoll before 8 accepts gpg exit codes other than 0 and 1 as evidence of a valid signature, which allows remote Slackware mirror sites or man-in-the-middle attackers to cause a denial of service (data inconsistency) or possibly install Trojan horse packages via malformed gpg signatures. | [] | null | null | null | null |
|
CVE-2022-21619 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:graalvm:20.3.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:22.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update341:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update345:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update341:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update345:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:santricity_web_services_proxy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
|
CVE-2021-41354 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*",
"cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*"
] | null | 5.4 | null | null |
GHSA-x6h7-972j-q4qr | A vulnerability in the web-based management interface of Cisco Video Surveillance Media Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to cause the web-based management interface to become unreachable, resulting in a DoS condition. | [] | null | null | 6.5 | null |
|
GHSA-wqcw-wh9g-67rg | In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 / MOLY01067019; Issue ID: MSV-2721. | [] | null | 7.5 | null | null |
|
GHSA-3962-w3j2-98vq | A format string vulnerability was identified in SMM/SMM2 and FPC that could allow an authenticated user to execute arbitrary commands on a specific API endpoint. | [] | null | 8.8 | null | null |
|
RHSA-2025:1019 | Red Hat Security Advisory: Satellite 6.16.2 Async Update | grpc: Denial of Service through Data corruption in gRPC-C++ | [
"cpe:/a:redhat:satellite:6.16::el8",
"cpe:/a:redhat:satellite:6.16::el9",
"cpe:/a:redhat:satellite_capsule:6.16::el8",
"cpe:/a:redhat:satellite_capsule:6.16::el9",
"cpe:/a:redhat:satellite_maintenance:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el9",
"cpe:/a:redhat:satellite_utils:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el9"
] | null | 5.3 | null | null |
RHSA-2015:1592 | Red Hat Security Advisory: Red Hat Satellite 6.1.1 on RHEL 6 | python-oauth2: _check_signature() ignores the nonce value when validating signed urls python-oauth2: Uses poor PRNG in nonce rhn_satellite_6: cross-site request forgery (CSRF) can force logout foreman: cross-site scripting (XSS) flaw in template preview screen foreman: lack of SSL certificate validation when performing LDAPS authentication foreman: API not scoping resources to taxonomies foreman: the _session_id cookie is issued without the Secure flag foreman: edit_users permission allows changing of admin passwords | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.1::el6"
] | null | null | null | null |
CVE-2022-3283 | A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 While cloning an issue with special crafted content added to the description could have been used to trigger high CPU usage. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-chq6-pgcm-wg35 | libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods. | [] | null | null | null | null |
|
GHSA-vvpg-cfgg-r45q | The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, which allows attackers to obtain sensitive information via an application that accesses the local filesystem. | [] | null | null | null | null |
|
CVE-2020-11603 | An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (incorporating TEEGRIS) software. Type confusion in the MLDAP Trustlet allows arbitrary code execution. The Samsung ID is SVE-2020-16599 (April 2020). | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-1551 | SP Project & Document Manager < 4.58 - Sensitive File Disclosure | The SP Project & Document Manager WordPress plugin before 4.58 uses an easily guessable path to store user files, bad actors could use that to access other users' sensitive files. | [
"cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2017-10188 | Vulnerability in the Hospitality Hotel Mobile component of Oracle Hospitality Applications (subcomponent: Suite 8/Android). The supported version that is affected is 1.01. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Hospitality Hotel Mobile executes to compromise Hospitality Hotel Mobile. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hospitality Hotel Mobile accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_hotel_mobile:1.01:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
GHSA-8pmg-2x8v-mfv9 | A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 2.1 | 6.3 | null | null |
|
RHSA-2024:4617 | Red Hat Security Advisory: qt5-qtbase security update | qtbase: qtbase: Delay any communication until encrypted() can be responded to | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2017:0914 | Red Hat Security Advisory: libreoffice security and bug fix update | libreoffice: Arbitrary file disclosure in Calc and Writer | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
CVE-2024-37178 | Cross-Site Scripting (XSS) vulnerabilities in SAP Financial Consolidation | SAP Financial Consolidation does not
sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting
(XSS) vulnerability. These endpoints are exposed over the network. The
vulnerability can exploit resources beyond the vulnerable component. On
successful exploitation, an attacker can cause limited impact to
confidentiality of the application. | [] | null | 5 | null | null |
GHSA-34x3-76m3-g8f7 | Dell PowerScale OneFS, versions 9.2.0.x through 9.4.0.x contain an information vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to cause data leak. | [] | null | 7.5 | null | null |
|
GHSA-22m7-p864-qh92 | Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
CVE-2019-9694 | Symantec Endpoint Encryption prior to SEE 11.2.1 MP1 may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | [
"cpe:2.3:a:symantec:endpoint_encryption:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1.3:hf2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1.3:hf3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.1.3:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-4356-rp47-23pr | Unspecified vulnerability in the Kernel PDB component in Oracle Database Server 12.1.0.2 allows local users to affect availability via unknown vectors. | [] | null | null | 6 | null |
|
CVE-2025-39493 | WordPress Rankie <= 1.8.0 - Broken Access Control Vulnerability | Missing Authorization vulnerability in ValvePress Rankie allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Rankie: from n/a through 1.8.0. | [] | null | 4.3 | null | null |
CVE-2012-6276 | Directory traversal vulnerability in the web-based management interface on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via the URL parameter. | [
"cpe:2.3:o:tp-link:tl-wr841n_firmware:3.13.9:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-38832 | School Activity Updates with SMS Notification v1.0 is vulnerable to SQL Injection via /activity/admin/modules/department/index.php?view=edit&id=. | [
"cpe:2.3:a:school_activity_updates_with_sms_notification_project:school_activity_updates_with_sms_notification:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2020-11172 | u'fscanf reads a string from a file and stores its contents on a statically allocated stack memory which leads to stack overflow' in Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA9531, QCA9980 | [
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-755m-fcp2-mgm7 | Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24516. | [] | null | 8 | null | null |
|
RHSA-2020:4990 | Red Hat Security Advisory: kernel security update | kernel: net: bluetooth: information leak when processing certain AMP packets | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5.3 | null | null |
GHSA-mhxp-j75h-h86w | Unspecified vulnerability in Panda Gold Protection and Global Protection 2014 7.01.01 and earlier, Internet Security 2014 19.01.01 and earlier, and AV Pro 2014 13.01.01 and earlier allows local users to gain privileges via unspecified vectors. | [] | null | null | null | null |
|
CVE-2019-20495 | cPanel before 82.0.18 allows attackers to read an arbitrary database via MySQL dump streaming (SEC-531). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2022-29084 | Dell Unity, Dell UnityVSA, and Dell Unity XT versions before 5.2.0.0.5.173 do not restrict excessive authentication attempts in Unisphere GUI. A remote unauthenticated attacker may potentially exploit this vulnerability to brute-force passwords and gain access to the system as the victim. Account takeover is possible if weak passwords are used by users. | [
"cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2024-7661 | SourceCodester Car Driving School Management System index.php save_users cross-site request forgery | A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been classified as problematic. This affects the function save_users of the file admin/user/index.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:car_driving_school_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 4.3 | 4.3 | 5 |
CVE-2017-0694 | A denial of service vulnerability in the Android media framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37093318. | [
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-q8m3-j662-prvh | Improper Privilege Management vulnerability in WP Sharks s2Member Pro allows Privilege Escalation.This issue affects s2Member Pro: from n/a through 240315. | [] | null | 7.5 | null | null |
|
GHSA-vm47-g7pv-4p7r | Unspecified vulnerability in IBM Lotus Quickr 8.1 before 8.1.0.10 services for Lotus Domino might allow remote authenticated users to cause a denial of service (daemon crash) by checking out a document that is accessed through a connector, aka SPR MMOI7PSR8J. | [] | null | null | null | null |
|
GHSA-mfff-j6fq-7f99 | Arbitrary File Descriptor Write vulnerability in libsec-ril prior to SMR Nov-2023 Release 1 allows local attacker to execute arbitrary code. | [] | null | 7.8 | null | null |
|
GHSA-3r7p-5g7m-j435 | Integer overflow in wxBitcoin and bitcoind before 0.3.11 allows remote attackers to bypass intended economic restrictions and create many bitcoins via a crafted Bitcoin transaction. | [] | null | null | null | null |
|
CVE-2001-1495 | network_query.php in Network Query Tool 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the target parameter. | [
"cpe:2.3:a:freshmeat:network_query_tool:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freshmeat:network_query_tool_phpnuke:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2025-1449 | Admin Shell Access Vulnerability in Rockwell Automation Verve Asset Manager | A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service. | [] | 7.5 | null | null | null |
GHSA-45fw-396c-r96x | An issue was discovered in /admin/users/update in M/Monit before 3.7.3. It allows unprivileged users to escalate their privileges to an administrator by requesting a password change and specifying the admin parameter. | [] | null | null | 9.8 | null |
|
GHSA-5h85-gj3f-vx5v | Missing Authorization vulnerability in Popup Box Team Popup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup box: from n/a through 4.5.1. | [] | null | 4.3 | null | null |
|
CVE-2022-36699 | Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/manage_category.php. | [
"cpe:2.3:a:ingredients_stock_management_system_project:ingredients_stock_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-p4rv-q343-3g8h | System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "subnet" POST parameter. | [] | null | null | 9.8 | null |
|
GHSA-76r5-84qj-h2gj | In the Linux kernel, the following vulnerability has been resolved:block: fix module reference leakage from bdev_open_by_dev error pathAt the time bdev_may_open() is called, module reference is grabbed
already, hence module reference should be released if bdev_may_open()
failed.This problem is found by code review. | [] | null | 5.5 | null | null |
|
GHSA-5v5h-mr5g-h898 | Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network. | [] | null | 7.5 | null | null |
|
GHSA-w447-c4rh-hwj6 | An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow. | [] | null | 6.5 | null | null |
|
GHSA-xq52-whfh-4w3m | In NVIDIA Jetson TX1 L4T R32 version branch prior to R32.2, Tegra bootloader contains a vulnerability in nvtboot in which the nvtboot-cpu image is loaded without the load address first being validated, which may lead to code execution, denial of service, or escalation of privileges. | [] | null | null | 6.7 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.