id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9fw7-mcq9-ghf3
ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.
[]
null
null
9.8
null
GHSA-x3gc-2q27-cx8r
3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.
[]
null
7.8
null
null
GHSA-f3fq-q8w4-w2rr
Rejected reason: Not used
[]
null
null
null
null
CVE-2023-38346
An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior.
[ "cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*", "cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2024-35958
net: ena: Fix incorrect descriptor free behavior
In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior ENA has two types of TX queues: - queues which only process TX packets arriving from the network stack - queues which only process TX packets forwarded to it by XDP_REDIRECT or XDP_TX instructions The ena_free_tx_bufs() cycles through all descriptors in a TX queue and unmaps + frees every descriptor that hasn't been acknowledged yet by the device (uncompleted TX transactions). The function assumes that the processed TX queue is necessarily from the first category listed above and ends up using napi_consume_skb() for descriptors belonging to an XDP specific queue. This patch solves a bug in which, in case of a VF reset, the descriptors aren't freed correctly, leading to crashes.
[]
null
5.5
null
null
GHSA-xg4x-58xv-5259
SQL injection vulnerability in todos.php in C. Desseno YouTube Blog (ytb) 0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2008-3306.
[]
null
null
null
null
GHSA-cv6c-2jmj-cr4h
Cross-Site Request Forgery (CSRF) vulnerability in wptom All-In-One Cufon allows Cross Site Request Forgery. This issue affects All-In-One Cufon: from n/a through 1.3.0.
[]
null
4.3
null
null
GHSA-v7hj-fwhg-gxcv
Dell Secure Connect Gateway (SCG) version 5.14.00.12 contains a broken cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by performing MitM attacks and let attackers obtain sensitive information.
[]
null
5.9
null
null
CVE-2010-4152
SQL injection vulnerability in catalog/index.shtml in 4site CMS 2.6, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the cat parameter. NOTE: the i and th vectors are already covered by CVE-2009-0646.
[ "cpe:2.3:a:4site:4site_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:4site:4site_cms:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:4site:4site_cms:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-12695
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
[ "cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*", "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*", "cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*", "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
7.5
null
7.8
CVE-2022-24797
Exposure of Sensitive Information in Pomerium
Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.
[ "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2007-0056
Multiple cross-site scripting (XSS) vulnerabilities in AShop Deluxe 4.5 and AShop Administration Panel allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to (a) ashop/catalogue.php and (b) ashop/basket.php, the (2) exp parameter to ashop/catalogue.php, the (3) searchstring parameter to (c) ashop/search.php, the (4) checkout and (5) action parameters to (d) ashop/shipping.php, the cat parameter to (f) cart-path/admin/editcatalogue.php, and the (7) resultpage parameter to (g) cart-path/admin/salesadmin.php.
[ "cpe:2.3:a:ashopsoftware:ashop_administration_panel:*:*:*:*:*:*:*:*", "cpe:2.3:a:ashopsoftware:ashop_deluxe:4.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-6v88-j2c7-5mr7
Multiple PHP remote file inclusion vulnerabilities in SpiffyJr phpRaid 2.9.5 through 3.0.b3 allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter in (1) auth.php and (2) auth_phpbb when the phpBB portal is enabled, and via a URL in the smf_root_path parameter in (3) auth.php and (4) auth_SMF when the SMF portal is enabled.
[]
null
null
null
null
CVE-2016-9222
A vulnerability in the web-based management interface of Cisco NetFlow Generation Appliance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvb15229. Known Affected Releases: 1.0(2).
[ "cpe:2.3:a:cisco:netflow_generation_appliance:1.0\\(2\\):*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2009-2048
Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors.
[ "cpe:2.3:a:cisco:crs:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:crs:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:crs:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:crs:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:crs:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:crs:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:crs:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:customer_response_applications:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ip_qm:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.0\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.0\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:4.5\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:5.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:6.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ccx:7.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_contact_center_express:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_contact_center_express:5.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_contact_center_express:6.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_contact_center_express:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_ip_ivr:7.0\\(1\\):*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2022-33234
Memory corruption in video due to configuration weakness. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[ "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2021-45570
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
[ "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-xjmr-q9w7-m3w7
Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42303.
[]
null
6.6
null
null
ICSA-22-284-01
Altair HyperView Player
The software performs operations on a memory buffer but can read from or write to a memory location outside of the intended boundary of the buffer. This hits initially as a read access violation, leading to a memory corruption situation.CVE-2022-2947 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.CVE-2022-2949 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.CVE-2022-2950 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to improper validation of array index vulnerability during processing of H3D files. A DWORD value from a PoC file is extracted and used as an index to write to a buffer, leading to memory corruption.CVE-2022-2951 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
CVE-2021-30917
A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted image may lead to arbitrary code execution.
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-v9mx-4pqq-h232
Bun has an Application-level Prototype Pollution vulnerability in the runtime native API for Glo
Versions of the package bun before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects.
[]
6.8
7.5
null
null
CVE-2023-27309
A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.2). The client query handler of the affected application fails to check for proper permissions for specific write queries. This could allow an authenticated remote attacker to perform unauthorized actions.
[ "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*" ]
null
5
null
null
GHSA-266r-h4p4-f6fp
Integer overflow for some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
2.4
4.8
null
null
CVE-2024-7329
YouDianCMS image_upload.php unrestricted upload
A vulnerability, which was classified as critical, was found in YouDianCMS 7. Affected is an unknown function of the file /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php. The manipulation of the argument files leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273252. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:youdiancms:youdiancms:7.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-mc22-5q92-8v85
Memory Safety Issue when using patch or merge on state and assign the result back to state
ImpactThis vulnerability is a memory safety Issue when using [`patch`](https://www.tremor.rs/docs/tremor-script/index#patch) or [`merge`](https://www.tremor.rs/docs/tremor-script/index#merge) on `state` and assign the result back to `state`. In this case affected versions of Tremor and the [tremor-script crate](https://crates.io/crates/tremor-script) maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct.DetailsIf affects the following two tremor-script language constructs:A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression and the expression to be merged needs to reference the `event`:A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression and the patch operations used need to reference the `event`:For constructs like this (it does not matter what it references in the expression to be merged or the patch operations) an optimization was applied to manipulate the target value in-place, instead of cloning it.Our `Value` struct, which underpins all event data in `tremor-script`, is representing strings as borrowed `beef::Cow<'lifetime, str>`, that reference the raw data `Vec<u8>` the event is based upon. We keep this raw byte-array next to the `Value` structure inside our `Event` as a self-referential struct, so we make sure that the structured `Value` and its references are valid across its whole lifetime.The optimization was considered safe as long as it was only possible to merge or patch `event` data or static data. When `state` was introduced to `tremor-script` (in version 0.7.3) a new possibility to keep `Value` data around for longer than the lifetime of an event emerged. If `event` data is merged or patched into `state` without cloning it first, it can still reference keys or values from the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire.PatchesThe issue has been patched in https://crates.io/crates/tremor-script/0.11.6 and https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch.WorkaroundsIf an upgrade is not possible, a possible workaround is to avoid the optimization by introducing a temporary variable and not immediately reassigning to `state`:ReferencesThe actual fix is applied in this PR: https://github.com/tremor-rs/tremor-runtime/pull/1217For more informationIf you have any questions or comments about this advisory:Open an issue on our repository [tremor-rs/tremor-runtime](https://github.com/tremor-rs/tremor-runtime)Please join our discord https://chat.tremor.rs and reach out to the team.
[]
null
6.5
null
null
GHSA-9vw5-h5q2-qpc9
A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351.
[]
null
9.8
null
null
GHSA-mrfw-74xj-r24f
Buffer overflow in the RFC1413 (ident) client in cfingerd 1.4.3-3 allows remote IDENT servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted response.
[]
null
null
null
null
RHSA-2009:1522
Red Hat Security Advisory: kernel security and bug fix update
kernel: netlink: fix numerous padding memleaks kernel: tc: uninitialised kernel memory leak kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-3cjr-x7x5-gqqh
The check_login function in login.php in Virtual Hosting Control System (VHCS) 2.4.7.1 and earlier does not exit when authentication fails, which allows remote attackers to gain unauthorized access.
[]
null
null
null
null
GHSA-hxh6-gm53-6gm3
A vulnerability, which was classified as problematic, has been found in Thecosy IceCMS up to 2.0.1. This issue affects some unknown processing of the component User Data Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247889 was assigned to this vulnerability.
[]
null
4.3
null
null
CVE-2022-34851
BIG-IP and BIG-IQ iControl SOAP vulnerability CVE-2022-34851
In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, and BIG-IQ Centralized Management all versions of 8.x, an authenticated attacker may cause iControl SOAP to become unavailable through undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-g6vq-46f2-9g62
A vulnerability in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect memory operations that the affected software performs when the software parses a username during login authentication. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device or cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are running Cisco IOS XE Software Release Fuji 16.7.1 or Fuji 16.8.1 and are configured to use AAA for login authentication. Cisco Bug IDs: CSCvi25380.
[]
null
9.8
null
null
GHSA-fgxq-h4x2-h94p
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1094, CVE-2019-1095, CVE-2019-1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101.
[]
null
null
6.5
null
CVE-2020-9857
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.5, Security Update 2020-003 Mojave, Security Update 2020-003 High Sierra. A malicious website may be able to exfiltrate autofilled data in Safari.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
GHSA-446x-f9hh-hqmm
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
[]
null
null
5.5
null
CVE-2011-4966
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
[ "cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*" ]
null
null
null
6
CVE-2008-3635
Stack-based buffer overflow in QuickTimeInternetExtras.qtx in an unspecified third-party Indeo v3.2 (aka IV32) codec for QuickTime, when used with Apple QuickTime before 7.5.5 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:intel:indeo:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2011-2674
BaserCMS before 1.6.12 does not properly restrict additions to the membership of the operators group, which allows remote authenticated users to gain privileges via unspecified vectors.
[ "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:basercms:basercms:1.6.11.3:*:*:*:*:*:*:*" ]
null
null
null
4.9
GHSA-28qc-v7xx-3vpf
The Persian Fonts WordPress plugin through 1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
6.1
null
null
GHSA-frgj-vg7w-2jv6
Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function.
[]
null
9.8
null
null
GHSA-3r86-pp9h-4fh6
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user&id=.
[]
null
8.8
null
null
GHSA-36ww-7vxr-9ggq
This affects the package s-cart/core before 4.4. The search functionality of the admin dashboard in core/src/Admin/Controllers/AdminOrderController.phpindex is vulnerable to XSS.
[]
null
null
null
null
CVE-2017-13818
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-rvqh-qh4f-c556
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows attackers to cause a denial of service (reset to TCC, TCC+, TCCi or XTC) via a malformed HTTP request that does not contain a leading / (slash) character.
[]
null
null
null
null
GHSA-cgf3-cx8v-m6p5
selectawasset.asp in Layton Helpbox 4.4.0 allows remote attackers to discover ODBC database credentials via an element=sys_asset_id request, which is not properly handled during construction of an error page.
[]
null
null
null
null
GHSA-mp5p-42hx-3ghq
Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
7
null
null
CVE-2023-36573
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2020-36752
The Coming Soon & Maintenance Mode Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.57. This is due to missing or incorrect nonce validation on the save_meta_box() function. This makes it possible for unauthenticated attackers to save meta boxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:wpconcern:coming_soon_\\&_maintenance_mode_page:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2023-22117
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-fvwg-j6fx-cf57
See.sys through 4.25 in the SoftEther VPN Server allows a user to specify any kernel address to which arbitrary bytes are written.
[]
null
7.8
null
null
CVE-2025-43703
An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484.
[]
null
6.1
null
null
RHSA-2024:3472
Red Hat Security Advisory: rh-nodejs14 security update
nodejs: CONTINUATION frames DoS
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
CVE-2023-37205
The use of RTL Arabic characters in the address bar may have allowed for URL spoofing. This vulnerability affects Firefox < 115.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-8q64-j7wc-42px
SlackRoll before 8 accepts gpg exit codes other than 0 and 1 as evidence of a valid signature, which allows remote Slackware mirror sites or man-in-the-middle attackers to cause a denial of service (data inconsistency) or possibly install Trojan horse packages via malformed gpg signatures.
[]
null
null
null
null
CVE-2022-21619
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:graalvm:20.3.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:21.3.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:22.2.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update341:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update345:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:17.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update341:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update345:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jre:11.0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:17.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*", "cpe:2.3:a:netapp:santricity_web_services_proxy:-:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*", "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*" ]
null
3.7
null
null
CVE-2021-41354
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
[ "cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*", "cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*" ]
null
5.4
null
null
GHSA-x6h7-972j-q4qr
A vulnerability in the web-based management interface of Cisco Video Surveillance Media Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to cause the web-based management interface to become unreachable, resulting in a DoS condition.
[]
null
null
6.5
null
GHSA-wqcw-wh9g-67rg
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 / MOLY01067019; Issue ID: MSV-2721.
[]
null
7.5
null
null
GHSA-3962-w3j2-98vq
A format string vulnerability was identified in SMM/SMM2 and FPC that could allow an authenticated user to execute arbitrary commands on a specific API endpoint.
[]
null
8.8
null
null
RHSA-2025:1019
Red Hat Security Advisory: Satellite 6.16.2 Async Update
grpc: Denial of Service through Data corruption in gRPC-C++
[ "cpe:/a:redhat:satellite:6.16::el8", "cpe:/a:redhat:satellite:6.16::el9", "cpe:/a:redhat:satellite_capsule:6.16::el8", "cpe:/a:redhat:satellite_capsule:6.16::el9", "cpe:/a:redhat:satellite_maintenance:6.16::el8", "cpe:/a:redhat:satellite_maintenance:6.16::el9", "cpe:/a:redhat:satellite_utils:6.16::el8", "cpe:/a:redhat:satellite_utils:6.16::el9" ]
null
5.3
null
null
RHSA-2015:1592
Red Hat Security Advisory: Red Hat Satellite 6.1.1 on RHEL 6
python-oauth2: _check_signature() ignores the nonce value when validating signed urls python-oauth2: Uses poor PRNG in nonce rhn_satellite_6: cross-site request forgery (CSRF) can force logout foreman: cross-site scripting (XSS) flaw in template preview screen foreman: lack of SSL certificate validation when performing LDAPS authentication foreman: API not scoping resources to taxonomies foreman: the _session_id cookie is issued without the Secure flag foreman: edit_users permission allows changing of admin passwords
[ "cpe:/a:redhat:satellite:6.1::el6", "cpe:/a:redhat:satellite_capsule:6.1::el6" ]
null
null
null
null
CVE-2022-3283
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 While cloning an issue with special crafted content added to the description could have been used to trigger high CPU usage.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
7.5
null
null
GHSA-chq6-pgcm-wg35
libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
[]
null
null
null
null
GHSA-vvpg-cfgg-r45q
The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, which allows attackers to obtain sensitive information via an application that accesses the local filesystem.
[]
null
null
null
null
CVE-2020-11603
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (incorporating TEEGRIS) software. Type confusion in the MLDAP Trustlet allows arbitrary code execution. The Samsung ID is SVE-2020-16599 (April 2020).
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2022-1551
SP Project & Document Manager < 4.58 - Sensitive File Disclosure
The SP Project & Document Manager WordPress plugin before 4.58 uses an easily guessable path to store user files, bad actors could use that to access other users' sensitive files.
[ "cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2017-10188
Vulnerability in the Hospitality Hotel Mobile component of Oracle Hospitality Applications (subcomponent: Suite 8/Android). The supported version that is affected is 1.01. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Hospitality Hotel Mobile executes to compromise Hospitality Hotel Mobile. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hospitality Hotel Mobile accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:hospitality_hotel_mobile:1.01:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
GHSA-8pmg-2x8v-mfv9
A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
2.1
6.3
null
null
RHSA-2024:4617
Red Hat Security Advisory: qt5-qtbase security update
qtbase: qtbase: Delay any communication until encrypted() can be responded to
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2017:0914
Red Hat Security Advisory: libreoffice security and bug fix update
libreoffice: Arbitrary file disclosure in Calc and Writer
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.7
null
CVE-2024-37178
Cross-Site Scripting (XSS) vulnerabilities in SAP Financial Consolidation
SAP Financial Consolidation does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. These endpoints are exposed over the network. The vulnerability can exploit resources beyond the vulnerable component. On successful exploitation, an attacker can cause limited impact to confidentiality of the application.
[]
null
5
null
null
GHSA-34x3-76m3-g8f7
Dell PowerScale OneFS, versions 9.2.0.x through 9.4.0.x contain an information vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to cause data leak.
[]
null
7.5
null
null
GHSA-22m7-p864-qh92
Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2019-9694
Symantec Endpoint Encryption prior to SEE 11.2.1 MP1 may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
[ "cpe:2.3:a:symantec:endpoint_encryption:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1.3:hf2:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1.3:hf3:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.1.3:mp1:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_encryption:11.2:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
GHSA-4356-rp47-23pr
Unspecified vulnerability in the Kernel PDB component in Oracle Database Server 12.1.0.2 allows local users to affect availability via unknown vectors.
[]
null
null
6
null
CVE-2025-39493
WordPress Rankie <= 1.8.0 - Broken Access Control Vulnerability
Missing Authorization vulnerability in ValvePress Rankie allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Rankie: from n/a through 1.8.0.
[]
null
4.3
null
null
CVE-2012-6276
Directory traversal vulnerability in the web-based management interface on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via the URL parameter.
[ "cpe:2.3:o:tp-link:tl-wr841n_firmware:3.13.9:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr841n:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-38832
School Activity Updates with SMS Notification v1.0 is vulnerable to SQL Injection via /activity/admin/modules/department/index.php?view=edit&id=.
[ "cpe:2.3:a:school_activity_updates_with_sms_notification_project:school_activity_updates_with_sms_notification:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2020-11172
u'fscanf reads a string from a file and stores its contents on a statically allocated stack memory which leads to stack overflow' in Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA9531, QCA9980
[ "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-755m-fcp2-mgm7
Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24516.
[]
null
8
null
null
RHSA-2020:4990
Red Hat Security Advisory: kernel security update
kernel: net: bluetooth: information leak when processing certain AMP packets
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
5.3
null
null
GHSA-mhxp-j75h-h86w
Unspecified vulnerability in Panda Gold Protection and Global Protection 2014 7.01.01 and earlier, Internet Security 2014 19.01.01 and earlier, and AV Pro 2014 13.01.01 and earlier allows local users to gain privileges via unspecified vectors.
[]
null
null
null
null
CVE-2019-20495
cPanel before 82.0.18 allows attackers to read an arbitrary database via MySQL dump streaming (SEC-531).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
CVE-2022-29084
Dell Unity, Dell UnityVSA, and Dell Unity XT versions before 5.2.0.0.5.173 do not restrict excessive authentication attempts in Unisphere GUI. A remote unauthenticated attacker may potentially exploit this vulnerability to brute-force passwords and gain access to the system as the victim. Account takeover is possible if weak passwords are used by users.
[ "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2024-7661
SourceCodester Car Driving School Management System index.php save_users cross-site request forgery
A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been classified as problematic. This affects the function save_users of the file admin/user/index.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:car_driving_school_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*" ]
6.9
4.3
4.3
5
CVE-2017-0694
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37093318.
[ "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-q8m3-j662-prvh
Improper Privilege Management vulnerability in WP Sharks s2Member Pro allows Privilege Escalation.This issue affects s2Member Pro: from n/a through 240315.
[]
null
7.5
null
null
GHSA-vm47-g7pv-4p7r
Unspecified vulnerability in IBM Lotus Quickr 8.1 before 8.1.0.10 services for Lotus Domino might allow remote authenticated users to cause a denial of service (daemon crash) by checking out a document that is accessed through a connector, aka SPR MMOI7PSR8J.
[]
null
null
null
null
GHSA-mfff-j6fq-7f99
Arbitrary File Descriptor Write vulnerability in libsec-ril prior to SMR Nov-2023 Release 1 allows local attacker to execute arbitrary code.
[]
null
7.8
null
null
GHSA-3r7p-5g7m-j435
Integer overflow in wxBitcoin and bitcoind before 0.3.11 allows remote attackers to bypass intended economic restrictions and create many bitcoins via a crafted Bitcoin transaction.
[]
null
null
null
null
CVE-2001-1495
network_query.php in Network Query Tool 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the target parameter.
[ "cpe:2.3:a:freshmeat:network_query_tool:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:freshmeat:network_query_tool_phpnuke:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-1449
Admin Shell Access Vulnerability in Rockwell Automation Verve Asset Manager
A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service.
[]
7.5
null
null
null
GHSA-45fw-396c-r96x
An issue was discovered in /admin/users/update in M/Monit before 3.7.3. It allows unprivileged users to escalate their privileges to an administrator by requesting a password change and specifying the admin parameter.
[]
null
null
9.8
null
GHSA-5h85-gj3f-vx5v
Missing Authorization vulnerability in Popup Box Team Popup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup box: from n/a through 4.5.1.
[]
null
4.3
null
null
CVE-2022-36699
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/manage_category.php.
[ "cpe:2.3:a:ingredients_stock_management_system_project:ingredients_stock_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-p4rv-q343-3g8h
System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "subnet" POST parameter.
[]
null
null
9.8
null
GHSA-76r5-84qj-h2gj
In the Linux kernel, the following vulnerability has been resolved:block: fix module reference leakage from bdev_open_by_dev error pathAt the time bdev_may_open() is called, module reference is grabbed already, hence module reference should be released if bdev_may_open() failed.This problem is found by code review.
[]
null
5.5
null
null
GHSA-5v5h-mr5g-h898
Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network.
[]
null
7.5
null
null
GHSA-w447-c4rh-hwj6
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.
[]
null
6.5
null
null
GHSA-xq52-whfh-4w3m
In NVIDIA Jetson TX1 L4T R32 version branch prior to R32.2, Tegra bootloader contains a vulnerability in nvtboot in which the nvtboot-cpu image is loaded without the load address first being validated, which may lead to code execution, denial of service, or escalation of privileges.
[]
null
null
6.7
null