id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2012:1483
Red Hat Security Advisory: thunderbird security update
Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93) Mozilla: Buffer overflow while rendering GIF images (MFSA 2012-92) Mozilla: Improper character decoding in HZ-GB-2312 charset (MFSA 2012-101) Mozilla: Frames can shadow top.location (MFSA 2012-103) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Improper security filtering for cross-origin wrappers (MFSA 2012-100) Mozilla: Miscellaneous memory safety hazards (rv:10.0.11) (MFSA 2012-91)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-qf6w-75pv-5q59
SQL injection vulnerability in the Fastball (com_fastball) component 1.1.0 through 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the league parameter to index.php.
[]
null
null
null
null
RHSA-2023:4159
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
GHSA-cqh8-v9mm-8fcx
sastcpd in SAS/Base 8.0 might allow local users to gain privileges by setting the netencralg environment variable, which causes a segmentation fault.
[]
null
null
null
null
RHSA-2020:0466
Red Hat Security Advisory: nss-softokn security update
nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
8.1
null
CVE-2017-14980
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
[ "cpe:2.3:a:flexense:syncbreeze:10.0.28:*:*:*:enterprise:*:*:*" ]
null
null
9.8
7.5
CVE-2019-18905
Deprecated functionality in autoyast2 automatically imports gpg keys without checking them
A Insufficient Verification of Data Authenticity vulnerability in autoyast2 of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows remote attackers to MITM connections when deprecated and unused functionality of autoyast is used to create images. This issue affects: SUSE Linux Enterprise Server 12 autoyast2 version 4.1.9-3.9.1 and prior versions. SUSE Linux Enterprise Server 15 autoyast2 version 4.0.70-3.20.1 and prior versions.
[ "cpe:2.3:a:opensuse:autoyast2:*:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*" ]
null
4.8
null
null
CVE-2019-8016
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
RHSA-2007:0729
Red Hat Security Advisory: kdegraphics security update
xpdf integer overflow
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
GHSA-4678-x95m-c2hf
An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via a malicious samba server.
[]
null
7.5
null
null
GHSA-q4r3-rj3j-6c93
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected products contain an out of bounds write vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
[]
null
7.8
null
null
CVE-2020-4152
IBM QRadar Network Security 5.4.0 and 5.5.0 transmits sensitive or security-critical data in cleartext in a communication channel that can be obtained using man in the middle techniques. IBM X-Force ID: 17467.
[ "cpe:2.3:a:ibm:qradar_network_security:*:*:*:*:*:*:*:*" ]
null
null
6.8
null
CVE-2024-49684
WordPress Backup and Staging by WP Time Capsule plugin <= 1.22.21 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Object Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21.
[ "cpe:2.3:a:revmakx:backup_and_staging_by_wp_time_capsule:-:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
GHSA-gj37-cqx6-h97x
SQL injection vulnerability in framework/modules/users/models/user.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
[]
null
null
9.8
null
cisco-sa-duo-dha-filewrite-xPMBMZAK
Cisco Duo Device Health Application for Windows Arbitrary File Write Vulnerability
A vulnerability in the CryptoService function of Cisco Duo Device Health Application for Windows could allow an authenticated, local attacker with low privileges to conduct directory traversal attacks and overwrite arbitrary files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by executing a directory traversal attack on an affected host. A successful exploit could allow an attacker to use a cryptographic key to overwrite arbitrary files with SYSTEM-level privileges, resulting in a denial of service (DoS) condition or data loss on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
7.1
null
null
GHSA-g2fp-2g2x-r9c5
A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /registered-user-testing.php of the component Registered Mobile Number Search. The manipulation of the argument regmobilenumber leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
3.5
null
null
GHSA-g5r6-f9g3-94h7
The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
[]
null
4.3
null
null
CVE-2008-6015
Multiple SQL injection vulnerabilities in search.php in EsFaq 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) keywords and (2) cat parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:editeurscripts:esfaq:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-32989
LCDS LAquis SCADA - Cross-site Scripting
When a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting.
[ "cpe:2.3:a:lcds:laquis_scada:*:*:*:*:*:*:*:*" ]
null
9.3
null
null
ICSA-24-051-02
ICSNPP - Ethercat Zeek Plugin
Industrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat Zeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds write in their primary analyses function for Ethercat communication packets. This could allow an attacker to cause arbitrary code execution. Industrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat Zeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds write while analyzing specific Ethercat datagrams. This could allow an attacker to cause arbitrary code execution. Industrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat Zeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds read during the process of analyzing a specific Ethercat packet. This could allow an attacker to crash the Zeek process and leak some information in memory.
[]
null
8.2
null
null
RHSA-2021:3818
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
dotnet: System.DirectoryServices.Protocols.LdapConnection sends credentials in plaintext if TLS handshake fails
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
5.7
null
null
GHSA-r642-x62f-jqhp
The NVMe driver queue processing is vulernable to guest-induced infinite loops.
[]
null
6.5
null
null
CVE-2021-34623
ProfilePress 3.0 - 3.1.3 - Arbitrary File Upload in Image Uploader Component
A vulnerability in the image uploader component found in the ~/src/Classes/ImageUploader.php file of the ProfilePress WordPress plugin made it possible for users to upload arbitrary files during user registration or during profile updates. This issue affects versions 3.0.0 - 3.1.3. .
[ "cpe:2.3:a:properfraction:profilepress:-:*:*:*:*:wordpress:*:*", "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-rjg6-q2fh-x6mj
Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overwriting the firmware, causing a denial-of-service (DoS) condition, and/or arbitrary code execution.
[]
null
9.8
null
null
CVE-2013-1652
Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's cache via unspecified vectors.
[ "cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" ]
null
null
null
4.9
CVE-2016-10751
osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload.
[ "cpe:2.3:a:osclass:osclass:3.6.1:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
CVE-2017-17608
Child Care Script 1.0 has SQL Injection via the /list city parameter.
[ "cpe:2.3:a:kindergarten_-_elementary_school_listing_script_project:kindergarten_-_elementary_school_listing_script:1.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-hpq2-jq6g-6g73
Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 and 10.0.x <= 10.0.0 fail to properly authorize the requests to /api/v4/channels  which allows a User or System Manager, with "Read Groups" permission but with no access for channels to retrieve details about private channels that they were not a member of by sending a request to /api/v4/channels.
[]
null
2.7
null
null
CVE-2000-1130
McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment.
[ "cpe:2.3:a:network_associates:webshield_smtp:4.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-m4qv-hj8q-qx52
Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919.
[]
null
7.8
null
null
CVE-2021-26827
Buffer Overflow in TP-Link WR2041 v1 firmware for the TL-WR2041+ router allows remote attackers to cause a Denial-of-Service (DoS) by sending an HTTP request with a very long "ssid" parameter to the "/userRpm/popupSiteSurveyRpm.html" webpage, which crashes the router.
[ "cpe:2.3:o:tp-link:tl-wr2041\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr2041\\+:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
CVE-2020-0657
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2020-11650
An issue was discovered in iXsystems FreeNAS (and TrueNAS) 11.2 before 11.2-u8 and 11.3 before 11.3-U1. It allows a denial of service. The login authentication component has no limits on the length of an authentication message or the rate at which such messages are sent.
[ "cpe:2.3:o:ixsystems:freenas_firmware:11.2:-:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u2:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u2.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u3:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u4:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u4.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u5:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u5.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u6:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u6.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.2:u7:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.3:-:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.3:alpha1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.3:alpha2:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.3:beta1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:freenas_firmware:11.3:rc2:*:*:*:*:*:*", "cpe:2.3:h:ixsystems:freenas:-:*:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:-:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u2:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u2.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u3:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u4:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u4.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u5:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u5.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u6:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u6.1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.2:u7:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.3:-:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.3:alpha1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.3:alpha2:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.3:beta1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:ixsystems:truenas_firmware:11.3:rc2:*:*:*:*:*:*", "cpe:2.3:h:ixsystems:truenas:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2008-0519
SQL injection vulnerability in index.php in the Atapin Jokes (com_jokes) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a CatView action.
[ "cpe:2.3:a:joomla:com_jokes:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:com_jokes:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-26hm-c7gj-q5mp
Emuse - eServices / eNvoice Exposure Of Private Personal Information due to lack of identification mechanisms and predictable IDs an attacker can scrape all the files on the service.
[]
null
7.5
null
null
CVE-2020-35923
An issue was discovered in the ordered-float crate before 1.1.1 and 2.x before 2.0.1 for Rust. A NotNan value can contain a NaN.
[ "cpe:2.3:a:ordered-float_project:ordered-float:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
CVE-2012-4019
Cross-site scripting (XSS) vulnerability in tokyo_bbs.cgi in Come on Girls Interface (CGI) Tokyo BBS allows remote attackers to inject arbitrary web script or HTML via vectors related to the error page.
[ "cpe:2.3:a:c61:tokyo_bbs:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2021:3147
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
5.5
null
null
GHSA-frqr-q9vw-43qg
A vulnerability has been identified in JT2Go (All versions), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
[]
null
5.5
null
null
GHSA-8fp3-p8fq-633j
Authorization Bypass Through User-Controlled Key vulnerability in FeedbackWP Rate my Post – WP Rating System.This issue affects Rate my Post – WP Rating System: from n/a through 3.4.4.
[]
null
5.3
null
null
CVE-2012-1875
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
9.3
CVE-2021-37016
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service.
[ "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*" ]
null
9.1
null
8.5
CVE-2017-3181
Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client
[ "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_client:-:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*", "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_web_player_client:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-cvfc-9w6x-3w3f
The Financial Stocks & Crypto Market Data Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'e' parameter in all versions up to, and including, 1.10.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2016-0386
Cross-site request forgery (CSRF) vulnerability in IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.4, and 3.5 before 3.5.0.2 allows remote authenticated users to hijack the authentication of administrators for requests that delete employees.
[ "cpe:2.3:a:ibm:tririga_application_platform:3.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.0.1:*:*:*:*:*:*:*" ]
null
null
8
6
GHSA-fc74-c6wg-pg27
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1272, CVE-2020-1277, CVE-2020-1302.
[]
null
null
null
null
GHSA-w88f-j9rc-h7v3
Jenkins SAML Single Sign On(SSO) Plugin missing permission checks
Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier does not perform a permission check in an HTTP endpoint.This allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange’s API for sending emails.Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.SAML Single Sign On(SSO) Plugin 2.0.1 removes the affected HTTP endpoint.
[]
null
4.3
null
null
GHSA-8h36-rhc9-ww5x
A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters.
[]
null
null
null
null
GHSA-pc5f-wcmf-whvm
The mint function of a smart contract implementation for MiningToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
7.5
null
null
GHSA-jrq7-3g58-rfqx
Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Patch installation scripts.
[]
null
null
null
null
GHSA-6jx2-q852-9994
Session fixation vulnerability in DataLife Engine (DLE) 9.7 and earlier allows remote attackers to hijack web sessions via the PHPSESSID cookie.
[]
null
null
null
null
CVE-2024-20274
Cisco Secure Firewall Management Center HTML Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document. This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, access arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To successfully exploit this vulnerability, an attacker would need valid credentials for a user account with policy-editing permissions, such as Network Admin, Intrusion Admin, or any custom user role with the same capabilities.
[]
null
5.5
null
null
GHSA-8r88-cc63-5rxm
A vulnerability in Cisco Industrial Network Director could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks. The vulnerability is due to improper validation of content submitted to the affected application. An attacker could exploit this vulnerability by sending requests containing malicious values to the affected system. A successful exploit could allow the attacker to conduct XSS attacks.
[]
null
null
5.4
null
RHSA-2022:0129
Red Hat Security Advisory: thunderbird security update
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
CVE-2014-6647
The ElForro.com (aka com.tapatalk.elforrocom) application 2.4.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:santiagosarceda:elforro.com:2.4.3.10:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2024-13583
Simple Gallery with Filter <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Simple Gallery with Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'c2tw_sgwf' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-26m8-fjr7-qf85
Heap-based buffer overflow in an API in GDI in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows context-dependent attackers to cause a denial of service or execute arbitrary code via a WMF file with a malformed file-size parameter, which would not be properly handled by a third-party application that uses this API for a copy operation, aka "GDI Heap Overflow Vulnerability."
[]
null
9.8
null
null
GHSA-3f79-hj49-8fgx
Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
[]
null
null
null
null
GHSA-jrm8-xgf3-fwqr
MobSF Partial Denial of Service (DoS)
Partial Denial of Service (DoS)**Product:** MobSF **Version:** v4.2.9 **CWE-ID:** CWE-1287: Improper Validation of Specified Type of Input **CVSS vector v.4.0:** 6.9 (AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) **CVSS vector v.3.1:** 6.5 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) **Description:** DoS in the Scans Results and iOS Dynamic Analyzer functionality **Impact:** Leveraging this vulnerability would make Scans Results and iOS Dynamic Analyzer pages unavailable. **Vulnerable component:** urls.py https://github.com/MobSF/Mobile-Security-Framework-MobSF/blob/d1d3b7a9aeb1a8c8c7c229a3455b19ade9fa8fe0/mobsf/MobSF/urls.py#L401 **Exploitation conditions:** A malicious application was uploaded to the MobSF. **Mitigation:** Check the uploaded bundle IDs against the regex. **Researcher: Oleg Surnin (Positive Technologies)**ResearchResearcher discovered zero-day vulnerability Partial Denial of Service (DoS) in MobSF in the Scans Results and iOS Dynamic Analyzer functionality. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). (https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier) However, an attacker can manually modify this value in `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. In the `urls.py` file URL rules are defined. https://github.com/MobSF/Mobile-Security-Framework-MobSF/blob/d1d3b7a9aeb1a8c8c7c229a3455b19ade9fa8fe0/mobsf/MobSF/urls.py#L401*Listing 3.*When the application parses the wrong characters in the bundle ID, it encounters an error. As a result, it will not display content and will throw a 500 error instead. The only way to make the pages work again is to manually remove the malicious application from the system.Vulnerability reproductionTo reproduce the vulnerability, follow the steps described below.• Unzip the IPA file of any iOS application.*Listing 4. Unzipping the file*• Modify the value of `<key>CFBundleIdentifier</key>` by adding restricted characters in the `Info.plist` file.*Figure 7. Example with `'` character`• Zip the modified IPA file.*Listing 5. Zipping the file*• Upload the modified IPA file to Static Analysis and wait until it finished • Open the following pages: `http://mobsf/recent_scans/` `http://mobsf/ios/dynamic_analysis/`*Figure 8. DoS Example**Figure 9. DoS Example*Please, assign all credits to Oleg Surnin (Positive Technologies)
[]
7.1
6.5
null
null
GHSA-xx86-qq8v-6h29
Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
CVE-2020-29509
The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-rwmq-3523-q2pg
A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.
[]
null
3.7
null
null
CVE-2018-7691
MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote Unauthorized Access
A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could allow Remote Unauthorized Access
[ "cpe:2.3:a:microfocus:fortify_software_security_center:17.10:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:fortify_software_security_center:17.20:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:fortify_software_security_center:18.10:*:*:*:*:*:*:*" ]
null
null
6.5
null
CVE-2020-14201
Dolibarr CRM before 11.0.5 allows privilege escalation. This could allow remote authenticated attackers to upload arbitrary files via societe/document.php in which "disabled" is changed to "enabled" in the HTML source code.
[ "cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
CVE-2017-1000186
In SWFTools, a stack overflow was found in pdf2swf.
[ "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2024-45372
MZK-DP300N firmware versions 1.04 and earlier contains a cross-site request forger vulnerability. Viewing a malicious page while logging in to the web management page of the affected product may lead the user to perform unintended operations such as changing the login password, etc.
[ "cpe:2.3:o:planex:mzk-dp300n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:planex:mzk-dp300n:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-wc4g-7869-crrh
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected products allow to upload certificates. An authenticated attacker could upload a crafted certificates leading to a permanent denial-of-service situation. In order to recover from such an attack, the offending certificate needs to be removed manually.
[]
7.1
6.5
null
null
GHSA-53qj-r27x-693f
An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.
[]
null
null
7
null
CVE-2024-35474
A Directory Traversal vulnerability in iceice666 ResourcePack Server before v1.0.8 allows a remote attacker to disclose files on the server, via setPath in ResourcePackFileServer.kt.
[]
null
6.5
null
null
CVE-2018-15927
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-5x67-5883-m2j8
Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
[]
null
null
9.8
null
CVE-2014-0995
The Standalone Enqueue Server in SAP Netweaver 7.20, 7.01, and earlier allows remote attackers to cause a denial of service (uncontrolled recursion and crash) via a trace level with a wildcard in the Trace Pattern.
[ "cpe:2.3:a:sap:netweaver:*:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver:7.20:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-9hr4-cwvw-3xm2
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
[]
null
7.1
null
null
RHSA-2023:4493
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
9.8
null
null
CVE-2020-36514
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. fill_buf may read from uninitialized memory locations.
[ "cpe:2.3:a:acc_reader_project:acc_reader:*:*:*:*:*:rust:*:*" ]
null
9.8
null
7.5
GHSA-v8rj-cvjr-w5pf
bbd server in Big Brother System and Network Monitor before 1.5c2 allows remote attackers to execute arbitrary commands via the "&" shell metacharacter.
[]
null
null
null
null
CVE-2020-11580
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, accepts an arbitrary SSL certificate.
[ "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
GHSA-wf2v-q544-4g93
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Information Disclosure Vulnerability".
[]
null
null
4.3
null
CVE-2021-42097
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
[ "cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8
null
8.5
CVE-2019-14079
Access to the uninitialized variable when the driver tries to unmap the dma buffer of a request which was never mapped in the first place leading to kernel failure in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MDM9607, MDM9640, MSM8909W, MSM8953, QCA6574AU, QCS605, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SM8150, SXR1130
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-9m4q-9h42-w37g
Knowage Suite before 7.4 is vulnerable to cross-site scripting (XSS). An attacker can inject arbitrary external script in '/knowagecockpitengine/api/1.0/pages/execute' via the 'SBI_HOST' parameter.
[]
null
null
null
null
CVE-2012-3409
ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation
[ "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2022-36504
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function Edit_BasicSSID.
[ "cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-85gc-chp6-6mm9
In the eCommerce module of the NextGEN Gallery Pro WordPress plugin before 3.1.11, there is an action to call get_cart_items via photocrati_ajax , after that the settings[shipping_address][name] is able to inject malicious javascript.
[]
null
null
null
null
CVE-2023-39051
An information leak in VISION MEAT WORKS Track Diner 10/10mbl v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
[ "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2023-51820
An issue in Blurams Lumi Security Camera (A31C) v.2.3.38.12558 allows a physically proximate attackers to execute arbitrary code.
[ "cpe:2.3:o:blurams:lumi_security_camera_a31c_firmware:2.3.38.12558:*:*:*:*:*:*:*", "cpe:2.3:h:blurams:lumi_security_camera_a31c:-:*:*:*:*:*:*:*" ]
null
6.8
null
null
CVE-2023-28175
Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request.
[ "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_7000_r2:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_7000_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_6000_firmware:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_4000_firmware:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_7000_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_7000_r3_firmware:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-433c-j67w-mcg5
bvlc.c in skarg BACnet Protocol Stack bacserv 0.9.1 and 0.8.5 is affected by a Buffer Overflow because of a lack of packet-size validation. The affected component is bacserv BACnet/IP BVLC forwarded NPDU. The function bvlc_bdt_forward_npdu() calls bvlc_encode_forwarded_npdu() which copies the content from the request into a local in the bvlc_bdt_forward_npdu() stack frame and clobbers the canary. The attack vector is: A BACnet/IP device with BBMD enabled based on this library connected to IP network. The fixed version is: 0.8.6.
[]
null
null
9.8
null
GHSA-gjxp-f524-fgrv
Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
[]
null
null
3.1
null
CVE-2018-17379
SQL Injection exists in the Raffle Factory 3.5.2 component for Joomla! via the filter_order_Dir or filter_order parameter.
[ "cpe:2.3:a:thephpfactory:raffle_factory:3.5.2:*:*:*:*:joomla\\!:*:*" ]
null
null
9.8
7.5
CVE-2012-3609
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2017-2345
Junos: snmpd denial of service upon receipt of crafted SNMP packet
On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial denial of service condition. Additionally, it may be possible to craft a malicious SNMP packet in a way that can result in remote code execution. SNMP is disabled in Junos OS by default. Junos OS devices with SNMP disabled are not affected by this issue. No other Juniper Networks products or platforms are affected by this issue. NOTE: This is a different issue than Cisco CVE-2017-6736, CVE-2017-6737, and CVE-2017-6738. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D67; 12.3X48 prior to 12.3X48-D51, 12.3X48-D55; 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R2-S10, 14.1R8-S4, 14.1R9; 14.1X50 prior to 14.1X50-D185; 14.1X53 prior to 14.1X53-D122, 14.1X53-D44, 14.1X53-D50; 14.2 prior to 14.2R4-S9, 14.2R7-S7, 14.2R8; 15.1 prior to 15.1F2-S18, 15.1F6-S7, 15.1R4-S8, 15.1R5-S5, 15.1R6-S1, 15.1R7; 15.1X49 prior to 15.1X49-D100, 15.1X49-D110; 15.1X53 prior to 15.1X53-D231, 15.1X53-D47, 15.1X53-D48, 15.1X53-D57, 15.1X53-D64, 15.1X53-D70; 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R4-S4, 16.1R5; 16.2 prior to 16.2R2, 16.2R3; 17.1 prior to 17.1R1-S3, 17.1R2, 17.1R3; 17.2 prior to 17.2R1-S1, 17.2R2; 17.2X75 prior to 17.2X75-D30. Junos releases prior to 10.2 are not affected.
[ "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x50:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r7-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d47:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d48:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*" ]
null
null
9.8
null
CVE-2001-0058
The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attackers to cause a denial of service via a URL that does not end in a space character.
[ "cpe:2.3:o:cisco:broadband_operating_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cisco_6xx_routers:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-hq9f-9pv4-876v
Directory traversal vulnerability in galeria.php in R2K Gallery 1.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the lang2 parameter.
[]
null
null
null
null
GHSA-x4wp-6w9q-mrxf
Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction.
[]
null
3.5
null
null
CVE-2024-0502
SourceCodester House Rental Management System Edit User manage_user.php sql injection
A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250610 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:oretnom23:house_rental_management_system:1.0:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
GHSA-6c35-5wr3-x5fr
Cross site scripting vulnerability in McAfee Network Security Management (NSM) Prior to 9.1 update 6 Mar 2020 Update allows attackers to unspecified impact via unspecified vectors.
[]
null
null
null
null
CVE-2021-1391
Cisco IOS and IOS XE Software Privilege Escalation Vulnerability
A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.
[ "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.2ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*" ]
null
5.1
null
null
CVE-2006-4655
Buffer overflow in the Strcmp function in the XKEYBOARD extension in X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment variable value.
[ "cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*" ]
null
null
null
4.6
CVE-2006-4860
Multiple unspecified vulnerabilities in (1) index.php, (2) minixml.inc.php, (3) doc.inc.php, (4) element.inc.php, (5) node.inc.php, (6) treecomp.inc.php, (7) forum.html.php, (8) forum.php, (9) antihack.php, (10) content.php, (11) initglobals.php, and (12) imanager.php in Limbo (aka Lite Mambo) CMS 1.0.4.2 before 20060311 have unknown impact and attack vectors.
[ "cpe:2.3:a:limbo_cms:limbo_cms:1.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:limbo_cms:limbo_cms:1.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:limbo_cms:limbo_cms:1.0.4.2l:*:*:*:*:*:*:*" ]
null
null
null
10