id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2012-2018 | Cross-site scripting (XSS) vulnerability in HP Network Node Manager i (NNMi) 8.x, 9.0x, and 9.1x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:hp:network_node_manager_i:8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:8.11.002:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:8.12.004:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:8.13.005:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:8.13.006:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:network_node_manager_i:9.10:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-39791 | In WallpaperManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194112606 | [
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-8w3f-mchr-v6jh | In the Linux kernel, the following vulnerability has been resolved:powerpc/47x: Fix 47x syscall return crashEddie reported that newer kernels were crashing during boot on his 476
FSP2 system:kernel tried to execute user page (b7ee2000) - exploit attempt? (uid: 0)
BUG: Unable to handle kernel instruction fetch
Faulting instruction address: 0xb7ee2000
Oops: Kernel access of bad area, sig: 11 [#1]
BE PAGE_SIZE=4K FSP-2
Modules linked in:
CPU: 0 PID: 61 Comm: mount Not tainted 6.1.55-d23900f.ppcnf-fsp2 #1
Hardware name: ibm,fsp2 476fpe 0x7ff520c0 FSP-2
NIP: b7ee2000 LR: 8c008000 CTR: 00000000
REGS: bffebd83 TRAP: 0400 Not tainted (6.1.55-d23900f.ppcnf-fs p2)
MSR: 00000030 <IR,DR> CR: 00001000 XER: 20000000
GPR00: c00110ac bffebe63 bffebe7e bffebe88 8c008000 00001000 00000d12 b7ee2000
GPR08: 00000033 00000000 00000000 c139df10 48224824 1016c314 10160000 00000000
GPR16: 10160000 10160000 00000008 00000000 10160000 00000000 10160000 1017f5b0
GPR24: 1017fa50 1017f4f0 1017fa50 1017f740 1017f630 00000000 00000000 1017f4f0
NIP [b7ee2000] 0xb7ee2000
LR [8c008000] 0x8c008000
Call Trace:
Instruction dump:
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
---[ end trace 0000000000000000 ]---The problem is in ret_from_syscall where the check for
icache_44x_need_flush is done. When the flush is needed the code jumps
out-of-line to do the flush, and then intends to jump back to continue
the syscall return.However the branch back to label 1b doesn't return to the correct
location, instead branching back just prior to the return to userspace,
causing bogus register values to be used by the rfi.The breakage was introduced by commit 6f76a01173cc
("powerpc/syscall: implement system call entry/exit logic in C for PPC32") which
inadvertently removed the "1" label and reused it elsewhere.Fix it by adding named local labels in the correct locations. Note that
the return label needs to be outside the ifdef so that CONFIG_PPC_47x=n
compiles. | [] | null | 5.5 | null | null |
|
CVE-2016-7873 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
GHSA-fx2p-rx2c-q8gq | Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15328708. | [] | null | null | null | null |
|
CVE-2006-4039 | Multiple SQL injection vulnerabilities in eintragen.php in GaesteChaos 0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters. | [
"cpe:2.3:a:chaossoft:gaestechaos:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2019:0717 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.4 | null |
GHSA-6r2c-g7f8-6rfj | Arbitrary memory overwrite when VM gets compromised in TX write leading to Memory Corruption. | [] | null | 7.8 | null | null |
|
GHSA-9prh-5p33-rp37 | IBM MQ Appliance 9.3 CD and LTS are vulnerable to a heap-based buffer overflow, caused by improper bounds checking. A remote authenticated attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash. IBM X-Force ID: 283137. | [] | null | 7.5 | null | null |
|
RHSA-2025:0167 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
GHSA-c4c4-86rp-wv48 | A vulnerability has been identified in SIMATIC Ident MV420 family (All versions), SIMATIC Ident MV440 family (All versions). Communication with the device is not encrypted. Data transmitted between the device and the user can be obtained by an attacker in a privileged network position. The security vulnerability can be exploited by an attacker in a privileged network position which allows evesdropping the communication between the affected device and the user. The user must invoke a session. Successful exploitation of the vulnerability compromises confidentiality of the data transmitted. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | null | null | null |
|
CVE-2007-1303 | Directory traversal vulnerability in rb.cgi in RRDBrowse 1.6 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [
"cpe:2.3:a:rrdbrowse:rrdbrowse:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
RHSA-2004:084 | Red Hat Security Advisory: httpd security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
CVE-2021-25964 | Stored Cross-Site Scripting (XSS) in Calibre-web via Description Field in Metadata | In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered. | [
"cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2000-1008 | PalmOS 3.5.2 and earlier uses weak encryption to store the user password, which allows attackers with physical access to the Palm device to decrypt the password and gain access to the device. | [
"cpe:2.3:o:palm:palm_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2015-2925 | The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack." | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-pch2-2f55-mvgj | Umanni RH 1.0 does not limit the number of authentication attempts. An unauthenticated user may exploit this vulnerability to launch a brute-force authentication attack against the Login page. | [] | null | null | null | null |
|
ICSA-22-349-19 | Siemens SICAM PAS | Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious DLL in this folder which is then run with SYSTEM rights when a service is started that requires this DLL.
At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions. Affected software does not properly validate the input for a certain parameter in the s7ontcp.dll. This could allow an unauthenticated remote attacker to send messages and create a denial of service condition as the application crashes.
At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions. Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature unauthenticated remote attackers could execute custom OS commands.
At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions. | [] | null | 8.3 | null | null |
GHSA-6hq6-w9x9-j77g | It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call. | [] | null | null | null | null |
|
CVE-2007-2971 | SQL injection vulnerability in getnewsitem.php in gCards 1.46 and earlier allows remote attackers to execute arbitrary SQL commands via the newsid parameter. | [
"cpe:2.3:a:greg_neustaetter:gcards:*:*:*:*:*:*:*:*",
"cpe:2.3:a:greg_neustaetter:gcards:1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:greg_neustaetter:gcards:1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:greg_neustaetter:gcards:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:greg_neustaetter:gcards:1.45:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2012-1256 | The single sign-on (SSO) implementation in EasyVista before 2010.1.1.89 allows remote attackers to bypass authentication via a modified url_account parameter, in conjunction with a valid login name in the SSPI_HEADER parameter, to index.php. | [
"cpe:2.3:a:easyvista:easyvista:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2009-1971 | Unspecified vulnerability in the Data Pump component in Oracle Database 10.1.0.5, 10.2.0.3, and 11.1.0.7 allows remote authenticated users to affect integrity via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2005-4685 | Firefox and Mozilla can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site. | [
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:preview_release:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.8:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.8:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.8:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.8:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:m15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:m16:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2009-4849 | Multiple cross-site request forgery (CSRF) vulnerabilities in ToutVirtual VirtualIQ Pro 3.2 build 7882 and 3.5 build 8691 allow remote attackers to hijack the authentication of administrators for requests that (1) create a new user account via a save action to tvserver/user/user.do, (2) shutdown a virtual machine, (3) start a virtual machine, (4) restart a virtual machine, or (5) schedule an activity. | [
"cpe:2.3:a:toutvirtual:virtualiq:3.2:-:pro:*:*:*:*:*",
"cpe:2.3:a:toutvirtual:virtualiq:3.5:-:pro:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2016-7068 | An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour. | [
"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
CVE-2015-3912 | Huawei E355s Mobile WiFi with firmware before 22.158.45.02.625 and WEBUI before 13.100.04.01.625 allows remote attackers to obtain sensitive configuration information by sniffing the network or sending unspecified commands. | [
"cpe:2.3:a:huawei:webui:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e355s_mobile_wifi_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:e355s_mobile_wifi:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2016-10295 | An information disclosure vulnerability in the Qualcomm LED driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-33781694. References: QC-CR#1109326. | [
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] | null | null | 4.7 | 2.6 |
|
RHSA-2016:0068 | Red Hat Security Advisory: kernel-rt security update | kernel: crypto api unprivileged arbitrary module load via request_module() kernel: memcg: OOM handling DoS kernel: crypto api unprivileged arbitrary module load via request_module() Kernel: vfs: Do not allow escaping from bind mounts kernel: Possible use-after-free vulnerability in keyring facility | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
CVE-2012-4024 | Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source. | [
"cpe:2.3:a:squashfs_project:squashfs:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2017-3134 | An escalation of privilege vulnerability in Fortinet FortiWLC-SD versions 8.2.4 and below allows attacker to gain root access via the CLI command 'copy running-config'. | [
"cpe:2.3:o:fortinet:fortiwlc-sd:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 |
|
GHSA-8qv9-jc88-jwmh | Certain credentials within the BigFix Patch Management Download Plug-ins are stored insecurely and could be exposed to a local privileged user. | [] | null | 4.6 | null | null |
|
CVE-2023-28106 | Pimcore vulnerable to Cross-site Scripting in UrlSlug Data type | Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-7934-59fw-r79m | Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599 | [] | null | null | 7.5 | null |
|
GHSA-x9h5-22vg-fr6q | A vulnerability was found in brandonfire miRNA_Database_by_PHP_MySql. It has been declared as critical. This vulnerability affects the function __construct/select_single_rna/count_rna of the file inc/model.php. The manipulation leads to sql injection. The name of the patch is 307c5d510841e6142ddcbbdbb93d0e8a0dc3fd6a. It is recommended to apply a patch to fix this issue. VDB-218374 is the identifier assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2010-5250 | Untrusted search path vulnerability in the pthread_win32_process_attach_np function in pthreadGC2.dll in Pthreads-win32 2.8.0 allows local users to gain privileges via a Trojan horse quserex.dll file in the current working directory. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:pthread-win32_project:pthreads-win32:2.8.0:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2014-1679 | Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite before 7.2.2-rev31, 7.4.0 before 7.4.0-rev27, and 7.4.1 before 7.4.1-rev17 allows remote attackers to inject arbitrary web script or HTML via the header in an attached SVG file. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-5r9f-76wq-x3p4 | A vulnerability that poses a potential risk of polluting the MXsecurity sqlite database and the nsm-web UI has been identified in MXsecurity versions prior to v1.0.1. This vulnerability might allow an unauthenticated remote attacker to register or add devices via the nsm-web application. | [] | null | 5.3 | null | null |
|
GHSA-4wx8-g7v3-ccf4 | TEXutil in ConTEXt, when executed with the --silent option, allows local users to overwrite arbitrary files via a symlink attack on texutil.log. | [] | null | null | null | null |
|
CVE-2024-50424 | WordPress Templately plugin <= 3.1.5 - Broken Access Control vulnerability | Missing Authorization vulnerability in Templately allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Templately: from n/a through 3.1.5. | [] | null | 6.5 | null | null |
CVE-2020-35138 | The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in the com/mobileiron/common/utils/C4928m.java file. NOTE: It has been asserted that there is no causality or connection between credential encryption and the MiTM attack | [
"cpe:2.3:a:mobileiron:mobile\\@work:*:*:*:*:*:android:*:*",
"cpe:2.3:a:mobileiron:mobile\\@work:*:*:*:*:*:iphone_os:*:*"
] | null | 9.8 | null | 5 |
|
CVE-2024-7364 | SourceCodester Tracking Monitoring Management System manage_records.php sql injection | A vulnerability has been found in SourceCodester Tracking Monitoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_records.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273343. | [
"cpe:2.3:a:sourcecodester:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2013-3952 | The fill_pipeinfo function in bsd/kern/sys_pipe.c in the XNU kernel in Apple Mac OS X 10.8.x allows local users to defeat the KASLR protection mechanism via the PROC_PIDFDPIPEINFO option to the proc_info system call for a kernel pipe handle. | [
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-w4c2-j77v-wmg3 | SOCIFI Socifi Guest wifi as SAAS wifi portal is affected by Insecure Permissions. Any authorized customer with partner mode can switch to another customer dashboard and perform actions like modify user, delete user, etc. | [] | null | 7.6 | null | null |
|
GHSA-49gw-vxvf-fc2g | The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms. | [] | null | 9.8 | null | null |
|
GHSA-5gw4-h372-4w6q | The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh. | [] | null | null | 9.8 | null |
|
CVE-2023-37435 | Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface | Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
| [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-3388-v38c-c9p8 | Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | [] | null | 7.8 | null | null |
|
CVE-2018-7337 | In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-4hfq-m672-xv3h | Multiple SQL injection vulnerabilities in index.php in MIM:InfiniX 1.2.003 and possibly earlier versions allow remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters in a calendar action, or (3) a search term in the search form. | [] | null | null | null | null |
|
GHSA-c2f5-xvj6-qcxv | A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. | [] | null | null | 9.8 | null |
|
GHSA-5pf8-vf72-97xp | An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer. | [] | null | 7.5 | null | null |
|
GHSA-94gh-mvm8-54cf | Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files. | [] | null | null | null | null |
|
CVE-2022-42029 | Chamilo 1.11.16 is affected by an authenticated local file inclusion vulnerability which allows authenticated users with access to 'big file uploads' to copy/move files from anywhere in the file system into the web directory. | [
"cpe:2.3:a:chamilo:chamilo:1.11.16:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
ICSA-23-236-01 | KNX Protocol | KNX devices that use KNX Connection Authorization and support Option 1 are, depending on the implementation, vulnerable to being locked and users being unable to reset them to gain access to the device. The BCU key feature on the devices can be used to create a password for the device, but this password can often not be reset without entering the current password. If the device is configured to interface with a network, an attacker with access to that network could interface with the KNX installation, purge all devices without additional security options enabled, and set a BCU key, locking the device. Even if a device is not connected to a network, an attacker with physical access to the device could also exploit this vulnerability in the same way. | [] | null | null | 7.5 | null |
GHSA-wjwj-mgc2-3fvp | ProcessGuard 3.410 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via kernel SSDT hooks for Windows Native API functions including (1) NtCreateFile, (2) NtCreateKey, (3) NtDeleteValueKey, (4) NtOpenFile, (5) NtOpenKey, and (6) NtSetValueKey. | [] | null | null | null | null |
|
GHSA-fpjq-x3v8-prvx | The Mailtree Log Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
|
CVE-2025-32487 | WordPress Waymark <= 1.5.2 - Server Side Request Forgery (SSRF) Vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Joe Waymark allows Server Side Request Forgery. This issue affects Waymark: from n/a through 1.5.2. | [] | null | 4.9 | null | null |
RHSA-2016:1481 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.7 | null |
GHSA-f57j-p87h-rp4f | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2024-6736 | SourceCodester Employee and Visitor Gate Pass Logging System view_employee.php sql injection | A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file view_employee.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271457 was assigned to this vulnerability. | [
"cpe:2.3:a:sourcecodester:employee_visitor_gatepass_logging_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
RHSA-2025:3637 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | event-driven-ansible: exposure inventory passwords in plain text when starting a rulebook activation with verbosity set to debug in EDA | [
"cpe:/a:redhat:ansible_automation_platform:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform:2.5::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9"
] | null | 6.5 | null | null |
CVE-2018-12116 | Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server. | [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:suse:suse_enterprise_storage:4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_openstack_cloud:7:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_openstack_cloud:8:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-j59f-6m4q-62h6 | Improper Key Verification in ipns | Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid.RecommendationUpdate to version 0.1.3 or later. | [] | null | 7.5 | null | null |
PYSEC-2024-134 | null | Nullptr in paddle.nextafter in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [] | null | 7.5 | null | null |
GHSA-7x7j-xxxm-h2x5 | The Zillion Muslims (aka com.zillionmuslims.src) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-gjvx-m7xv-4hgc | An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation, arbitrary local files can be retrieved by accessing the back-end Tomcat server directly. | [] | null | 6.5 | null | null |
|
CVE-2023-24221 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/DeptMapper.xml. | [
"cpe:2.3:a:luckyframe:luckyframeweb:3.5:*:*:*:*:luckyframe:*:*"
] | null | 9.8 | null | null |
|
CVE-2016-2232 | Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost. | [
"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.27.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.27.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.28.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.32.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.28:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-q2pp-wpvj-9w74 | Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP. | [] | null | null | null | null |
|
GHSA-7pxw-wr4x-29hm | Rejected reason: This CVE ID was unused by the CNA. | [] | null | null | null | null |
|
CVE-2017-10213 | Vulnerability in the Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: WebConnect). The supported version that is affected is 8.10.x. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Hospitality Suite8 executes to compromise Hospitality Suite8. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hospitality Suite8 accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_suite8:8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*"
] | null | null | 4 | 2.1 |
|
CVE-2022-50098 | scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts | In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts
Ensure SRB is returned during I/O timeout error escalation. If that is not
possible fail the escalation path.
Following crash stack was seen:
BUG: unable to handle kernel paging request at 0000002f56aa90f8
IP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]
Call Trace:
? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]
? qla2x00_start_sp+0x116/0x1170 [qla2xxx]
? dma_pool_alloc+0x1d6/0x210
? mempool_alloc+0x54/0x130
? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]
? qla_do_work+0x2d/0x40 [qla2xxx]
? process_one_work+0x14c/0x390 | [] | null | null | null | null |
RHSA-2024:0107 | Red Hat Security Advisory: nss security update | nss: timing attack against RSA decryption | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.5 | null | null |
GHSA-565p-wmq6-hx4g | Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | null | null | null |
|
GHSA-3w4p-r654-56p4 | Multiple SQL injection vulnerabilities in Free LAN In(tra|ter)net Portal (FLIP) before 1.0-RC3 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: some sources mention the escape_sqlData, implode_sql, and implode_sqlIn functions, but these are protection schemes, not the vulnerable functions. | [] | null | null | null | null |
|
GHSA-3qwq-p88c-9vwf | /var/lib/ovirt-engine/setup/engine-DC-config.py in Red Hat QuickStart Cloud Installer (QCI) before 1.0 GA is created world readable and contains the root password of the deployed system. | [] | null | null | 9.8 | null |
|
CVE-2025-31777 | WordPress Clockinator Lite plugin <= 1.0.7 - Broken Access Control vulnerability | Missing Authorization vulnerability in BeastThemes Clockinator Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Clockinator Lite: from n/a through 1.0.7. | [] | null | 5.3 | null | null |
GHSA-rjf5-465j-64g2 | Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer. | [] | null | 7.8 | null | null |
|
GHSA-h7pr-3fcx-999q | A stack-based buffer overflow in the built-in web server in Moxa NPort W2150A/W2250A Series firmware version 2.3 and prior allows a remote attacker to exploit the vulnerability by sending crafted payload to the web service. Successful exploitation of the vulnerability could result in denial of service. | [] | null | 8.2 | null | null |
|
GHSA-7wx4-4999-cgfj | In the Linux kernel, the following vulnerability has been resolved:jfs: fix array-index-out-of-bounds in diAllocCurrently there is not check against the agno of the iag while
allocating new inodes to avoid fragmentation problem. Added the check
which is required. | [] | null | 7.8 | null | null |
|
GHSA-rmf7-j7x8-47jw | A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.1 | 2.7 | null | null |
|
GHSA-7mwx-qx55-6x35 | Missing Authorization vulnerability in GRÜN Software Group GmbH GRÜN spendino Spendenformular allows Privilege Escalation.This issue affects GRÜN spendino Spendenformular: from n/a through 1.0.1. | [] | null | 9.8 | null | null |
|
GHSA-vcjj-9vg7-vf68 | Null pointer dereference in TFLite | ImpactAn attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer.PatchesWe have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang of Baidu Security. | [] | 8.5 | 7.8 | null | null |
GHSA-x8j7-vxh9-p67g | CSRF vulnerability in Jenkins Katalon Plugin allows capturing credentials | Katalon Plugin 1.0.33 and earlier does not require POST requests for several HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities.This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Katalon Plugin 1.0.34 requires POST requests for the affected HTTP endpoints. | [] | null | 4.2 | null | null |
CVE-2010-3876 | net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
GHSA-mjp6-fq4v-qgrp | The Simple - Better Banking application 2.45.0 through 2.45.3 (fixed in 2.46.0) for Android was affected by an information disclosure vulnerability that leaked the user's password to the keyboard autocomplete functionality. Third-party Android keyboards that capture the password may store this password in cleartext, or transmit the password to third-party services for keyboard customization purposes. A compromise of any datastore that contains keyboard autocompletion caches would result in the disclosure of the user's Simple Bank password. | [] | null | null | null | null |
|
CVE-2023-0873 | Kanban Boards for WordPress < 2.5.21 - Admin+ Stored XSS | The Kanban Boards for WordPress plugin before 2.5.21 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:kanbanwp:kanban_boards_for_wordpress:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2023-2887 | User Authentication Bypass in CBOT's Chatbot | Authentication Bypass by Spoofing vulnerability in CBOT Chatbot allows Authentication Bypass.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| [
"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-43cp-6p3q-2pc4 | HtmlSanitizer vulnerable to Cross-site Scripting in Foreign Content | ImpactThe vulnerability occurs in configurations where foreign content is allowed, i.e. either `svg` or `math` are in the list of allowed elements.
Specifically, the requirements for the vulnerability are:Allowing one foreign element: `svg`, or `math`Comments or one raw text element: `iframe`, `noembed`, `xmp`, `title`, `noframes`, `style` or `noscript`Configurations that meet the above requirements plus the following are vulnerable to an additional vulnerability:Any HTML integration element: `title`, `desc`, `mi`, `mo`, `mn`, `ms`, `mtext`, `annotation-xml`.In case an application sanitizes user input with a vulnerable configuration, an attacker could
bypass the sanitization and inject arbitrary HTML, including JavaScript code.Note that in the default configuration the vulnerability is not present.PatchesThe vulnerability has been fixed in versions 8.0.723 and 8.1.722-beta (preview version).WorkaroundsDisallow foreign elements `svg` and `math`. This is the case in the default configuration, which is therefore not affected by the vulnerability. | [] | null | 6.1 | null | null |
CVE-2021-30329 | Possible assertion due to improper validation of TCI configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2014:1327 | Red Hat Security Advisory: php security update | gd: NULL pointer dereference in gdImageCreateFromXpm() file: mconvert incorrect handling of truncated pascal string size file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting php: gd extension NUL byte injection in file names | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:7515 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update | kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
CVE-2024-51064 | Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection via the tid parameter to admin/queries.php. | [
"cpe:2.3:a:phpgurukul:teachers_record_management_system:2.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2019-12432 | An issue was discovered in GitLab Community and Enterprise Edition 8.13 through 11.11. Non-member users who subscribed to issue notifications could access the title of confidential issues through the unsubscription page. It allows Information Disclosure. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2016-0971 | Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2014-9830 | coders/sun.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted sun file. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-w3q2-jmrg-5rfm | Mattermost fails to check the "Show Full Name" setting when rendering the result for the /plugins/focalboard/api/v2/users API call, allowing an attacker to learn the full name of a board owner. | [] | null | 4.3 | null | null |
|
GHSA-wp62-w6xh-5jjc | In Nessus before 7.1.0, a XSS vulnerability exists due to improper input validation. A remote authenticated attacker could create and upload a .nessus file, which may be viewed by an administrator allowing for the execution of arbitrary script code in a user's browser session. In other scenarios, XSS could also occur by altering variables from the Advanced Settings. | [] | null | null | 5.4 | null |
|
GHSA-rxhx-9fj6-6h2m | enum_map macro can cause UB when `Enum` trait is incorrectly implemented | Affected versions of this crate did not properly check the length of an enum when using `enum_map!` macro, trusting user-provided length.When the `LENGTH` in the `Enum` trait does not match the array length in the `EnumArray` trait, this can result in the initialization of the enum map with uninitialized types, which in turn can allow an attacker to execute arbitrary code.This problem can only occur with a manual implementation of the Enum trait, it will never occur for enums that use `#[derive(Enum)]`.Example code that triggers this vulnerability looks like this:The flaw was corrected in commit [b824e23](https://github.com/xfix/enum-map/commit/b824e232f2fb47837740070096ac253df8e80dfc) by putting `LENGTH` property on sealed trait for macro to read. | [] | null | null | null | null |
GHSA-wrgx-77j9-vq8p | Puppet Enterprise before 3.7.1 allows remote authenticated users to obtain licensing and certificate signing request information by leveraging access to an unspecified API endpoint. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.