id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-jx94-cc76-x227 | Multiple vulnerabilities in fliccd, when installed setuid root as part of the kdeedu Kstars support for Instrument Neutral Distributed Interface (INDI) in KDE 3.3 to 3.3.2, allow local users and remote attackers to execute arbitrary code via stack-based buffer overflows. | [] | null | null | null | null |
|
GHSA-h532-f87j-947q | VP9 Video Extensions Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2024-51576 | WordPress AMP Img Shortcode plugin <= 1.0.1 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPZA AMP Img Shortcode allows Stored XSS.This issue affects AMP Img Shortcode: from n/a through 1.0.1. | [
"cpe:2.3:a:wpza:amp_img_shortcode:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-5p99-hcg9-j3m3 | In the Linux kernel, the following vulnerability has been resolved:wifi: ath11k: fix htt pktlog lockingThe ath11k active pdevs are protected by RCU but the htt pktlog handling
code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.Compile tested only. | [] | null | 4.4 | null | null |
|
CVE-2020-0981 | A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"
] | null | 8.8 | null | 4.6 |
|
CVE-2021-31761 | Webmin 1.973 is affected by reflected Cross Site Scripting (XSS) to achieve Remote Command Execution through Webmin's running process feature. | [
"cpe:2.3:a:webmin:webmin:1.973:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 |
|
CVE-2019-13956 | Discuz!ML 3.2 through 3.4 allows remote attackers to execute arbitrary PHP code via a modified language cookie, as demonstrated by changing 4gH4_0df5_language=en to 4gH4_0df5_language=en'.phpinfo().'; (if the random prefix 4gH4_0df5_ were used). | [
"cpe:2.3:a:codersclub:discuz\\!ml:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-vmmh-qh6f-w288 | Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub component of Oracle PeopleSoft Products (subcomponent: EPPCM_DEFN_CATG). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
GHSA-jcpx-m7gm-9r9g | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Rometheme RomethemeKit For Elementor allows Stored XSS.This issue affects RomethemeKit For Elementor: from n/a through 1.5.0. | [] | null | 6.5 | null | null |
|
GHSA-j5h9-9r39-43q5 | PaddlePaddle command injection in get_online_pass_interval | PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resulted in the ability to execute arbitrary commands on the operating system. | [] | null | 9.6 | null | null |
CVE-2019-11461 | An issue was discovered in GNOME Nautilus 3.30 prior to 3.30.6 and 3.32 prior to 3.32.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063. | [
"cpe:2.3:a:gnome:nautilus:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.4 |
|
GHSA-h9m9-95j2-cpmj | PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component. | [] | null | 8.8 | null | null |
|
ICSA-24-093-01 | IOSIX IO-1020 Micro ELD | ELD uses a default WIFI password that could allow an adjacent attacker to connect to the device. Web server uses a default password for authentication. ELD downloads source code or an executable from an adjacent location and executes the code without sufficiently verifying the origin or integrity of the code. | [] | null | 9.6 | null | null |
CVE-2023-1053 | SourceCodester Music Gallery Site view_category.php sql injection | A vulnerability was found in SourceCodester Music Gallery Site 1.0 and classified as critical. This issue affects some unknown processing of the file view_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221819. | [
"cpe:2.3:a:music_gallery_site_project:music_gallery_site:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 |
CVE-2013-1216 | Memory leak in the SNMP module in Cisco IOS XR allows remote authenticated users to cause a denial of service (memory consumption and process restart) via crafted SNMP packets, aka Bug ID CSCue31546. | [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2023-1707 | Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6. | [
"cpe:2.3:o:hp:futuresmart_5:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_5700_49k98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_5700_6qn28a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6700_49l00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6700_4y280a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6700_58m42a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6700_6qn33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6701_49l00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6701_4y280a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6701_58m42a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_6701_6qn33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_49k96av:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_58r10a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn31a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_49k84a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_4y279a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_49k97av:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_6qp98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_6qp99a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_49k96av:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_58r10a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn31a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_49k84a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_4y279a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_49k97av:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_6qp98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_6qp99a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_x55745_49k99a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_x55745_6qp97a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_m455_3pz95a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m480_3qa55a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_e45028_3qa35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e47528_3qa75a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qj81a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qj83a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qk15a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qj81a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qj83a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qk15a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qj81a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qj83a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qk15a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj32a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj33a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj34a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qj90a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qj94a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qk18a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj19a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj21a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj22a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj36a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj37a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj38a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk20a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_enterprise_m406_3pz15a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_enterprise_m407_3pz16a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_enterprise_mfp_m430_3pz55a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_enterprise_mfp_m431_3pz56a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e40040_3pz35a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_3sj07a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_3sj08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_3sj09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_3sj28a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_3sj29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_3sj30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_5qk09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82650_5qk13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_3sj07a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_3sj08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_3sj09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_3sj28a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_3sj29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_3sj30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_5qk09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82660_5qk13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_3sj07a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_3sj08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_3sj09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_3sj28a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_3sj29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_3sj30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_5qk09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_e82670_5qk13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73030_3sj03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73030_3sj04a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73030_5qj87a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_5qj98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_5qk02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs57a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_5qj98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_5qk02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs57a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_5qj98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_5qk02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs57a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj07a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj28a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_5qk09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_5qk13a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e42540_3pz75a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73025_3sj03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73025_3sj04a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73025_5qj87a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73030_3sj03a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73030_3sj04a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73030_5qj87a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_5qj98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_5qk02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs57a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_5qj98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_5qk02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs57a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj00a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj01a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_5qj98a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_5qk02a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs57a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs58a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs59a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj07a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj28a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj29a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj30a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_5qk09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_5qk13a:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-xq5f-88w9-ffw2 | The Popup4Phone WordPress plugin through 1.3.2 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins. | [] | null | 6.1 | null | null |
|
GHSA-2rmx-8hf9-hm7v | 74cmsSE v3.5.1 was discovered to contain an arbitrary file read vulnerability via the component \index\controller\Download.php. | [] | null | 7.5 | null | null |
|
RHSA-2020:0366 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | hw: TSX Transaction Asynchronous Abort (TAA) QEMU: slirp: heap buffer overflow during packet reassembly | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
GHSA-m9g4-v75g-m92j | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability. | [] | null | null | null | null |
|
GHSA-p62r-64jx-j6cx | unzoo allows remote attackers to cause a denial of service (infinite loop and resource consumption) via unspecified vectors to the (1) ExtrArch or (2) ListArch function, related to pointer handling. | [] | null | null | null | null |
|
GHSA-c359-g3mh-v8vw | DECISO OPNsense 23.1 does not impose rate limits for authentication, allowing attackers to perform a brute-force attack to bypass authentication. | [] | null | 9.8 | null | null |
|
CVE-2017-5016 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2009-1288 | Multiple cross-site scripting (XSS) vulnerabilities in the Advanced Management Module (AMM) on the IBM BladeCenter, including the BladeCenter H with BPET36H 54, allow remote attackers to inject arbitrary web script or HTML via (1) the username in a login action or (2) the PATH parameter to private/file_management.ssi in the File manager. | [
"cpe:2.3:a:ibm:advanced_management_module:1.36h:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:e:*:1881:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:e:*:7967:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:e:*:8677:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:h:*:7989:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:h:*:8852:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hc10:*:7996:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs12:*:1916:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs12:*:8014:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs12:*:8028:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs20:*:1883:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs21:*:1885:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs21:*:8853:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs21_xm:*:1915:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs21_xm:*:7995:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:ht:*:8740:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:ht:*:8750:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:js12:*:7998:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:js21:*:7988:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:js21:*:8844:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:js22:*:7998:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:ls20:*:8850:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:ls21:*:7971:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:ls41:*:7972:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:qs21:*:0792:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:qs22:*:0793:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:s:*:1948:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:s:*:8886:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:t:*:8720:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:t:*:8730:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-h63h-5c77-77p5 | XWiki Platform vulnerable to remote code execution from account via SearchSuggestConfigSheet | ImpactAny user with edit right on any page can perform arbitrary remote code execution by adding instances of `XWiki.SearchSuggestConfig` and `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation.To reproduce on an instance, as a user without script nor programming rights, add an object of type `XWiki.SearchSuggestConfig` to your profile page, and an object of type `XWiki.SearchSuggestSourceClass` as well. On this last object, set both `name` and `icon` properties to `$services.logging.getLogger("attacker").error("I got programming: $services.security.authorization.hasAccess('programming')")` and `limit` and `engine` to `{{/html}}{{async}}{{velocity}}$services.logging.getLogger("attacker").error("I got programming: $services.security.authorization.hasAccess('programming')"){{/velocity}}{{/async}}`. Save and display the page. If the logs contain any message `ERROR attacker - I got programming: true` then the instance is vulnerable.PatchesThis vulnerability has been patched in XWiki 14.10.21, 15.5.5 and 15.10.2.WorkaroundsWe're not aware of any workaround except upgrading.Referenceshttps://jira.xwiki.org/browse/XWIKI-21473https://github.com/xwiki/xwiki-platform/commit/742cd4591642be4cdcaf68325f17540e0934e64e | [] | 9.4 | 9.9 | null | null |
CVE-2017-18381 | The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials. | [
"cpe:2.3:a:edx:edx-platform:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
RHSA-2025:8640 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Out-of-bounds access when resolving Promise objects firefox: thunderbird: Out-of-bounds access when optimizing linear sums | [
"cpe:/a:redhat:rhel_aus:8.4::appstream"
] | null | 8.8 | null | null |
GHSA-xjwr-m2j3-wmrh | SQL injection vulnerability in artykul_print.php in CreateVision CMS allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
GHSA-7x5r-2w9m-9h9w | Cross-site scripting (XSS) vulnerability in index.php in WBBlog allows remote attackers to inject arbitrary web script or HTML via the e_id parameter in a viewentry cmd. | [] | null | null | null | null |
|
GHSA-7225-m954-23v7 | ASA-2024-010: cosmossdk.io/math: Mismatched bit-length validation in sdk.Int and sdk.Dec can lead to panic | Name: ASA-2024-010: Mismatched bit-length in `sdk.Int` and `sdk.Dec` can lead to panic
Component: Cosmos SDK / Math
Criticality: High (Considerable Impact, and Possible Likelihood per [ACMv1.2](https://github.com/interchainio/security/blob/main/resources/CLASSIFICATION_MATRIX.md))
Affected versions: `cosmossdk.io/math` package versions <= `math/v1.3.0`
Affected users: Chain Builders + Maintainers, ValidatorsImpactThe bit-length in `sdk.Int` and `sdk.Dec` are not aligned, which may present a possible panic condition when interacting with `Dec` types in an `Int` context. This issue was resolved by aligning the max size between the data types in the cosmossdk.io/math package.This issue impacts consumers of the cosmossdk.io/math, which includes popular modules including IBC-Go and tokenfactory (permissionless). If your chain interacts with APIs in the cosmossdk.io/math package, or utilizes a module that consumes this library, it is advised to update to the latest version at the time of the patch release by updating your project's go.mod dependency for cosmossdk.io/math.The patch can be applied without a hard-fork, and with a version bump in a chain's go.mod file like the following:`go.mod`[!NOTE]
When on a lower version than cosmossdk.io/math v1.3.0, please do a coordinated upgrade before upgrading to >= 1.3.0PatchesThe new release of `cosmossdk.io/math v1.4.0` resolves this issue. Chains that utilize the cosmossdk.io/math library or modules that utilize the cosmossdk.io/math library should update to avoid this condition.TimelineOctober 31, 2024, 6:55pm UTC: Issue reported to the Cosmos Bug Bounty programOctober 31, 2024, 8:56pm UTC: Issue triaged by Amulet on-call, and distributed to Core teamNov 15, 2024, 2:12am PST: Core team completes patch for issueNov 19, 2024, 8:00am PST / 16:00 GMT: Pre-notification deliveredNov 20, 2024, 8:00am PST / 16:00 GMT: Patch made availableThis issue was reported by LonelySloth to the Cosmos Bug Bounty Program on HackerOne on October 31, 2024. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.If you have questions about Interchain security efforts, please reach out to our official communication channel at [[email protected]](mailto:[email protected]). For more information about the Interchain Foundation’s engagement with Amulet, and to sign up for security notification emails, please see https://github.com/interchainio/security. | [] | 8.7 | null | null | null |
RHSA-2020:2617 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7.1-1 - RHEL7 Container | Tower: rsyslog configuration has world readable permissions | [
"cpe:/a:redhat:ansible_tower:3.7::el7"
] | null | 6.5 | null | null |
CVE-2008-1538 | Cross-site scripting (XSS) vulnerability in searchAction.do in ManageEngine EventLog Analyzer 5 allows remote attackers to inject arbitrary web script or HTML via the searchText parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Fixed in EventLog Analyzer 10.0 Build 10000. | [
"cpe:2.3:a:manageengine:eventlog_analyzer:5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cx73-469p-m8ph | WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. | [] | null | null | null | null |
|
CVE-2013-0933 | Multiple cross-site scripting (XSS) vulnerabilities in EMC RSA Archer 5.x before GRC 5.3SP1, and Archer Smart Suite Framework 4.x, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:emc:rsa_archer_egrc:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_smartsuite:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_smartsuite:4.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-9046 | In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf100282d. | [
"cpe:2.3:a:windows_optimization_master_project:windows_optimization_master:7.99.13.604:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 |
|
GHSA-mmww-6jx8-6gwm | mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bug 22954006. | [] | null | null | null | null |
|
CVE-2001-0282 | SEDUM 2.1 HTTP server allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long HTTP request. | [
"cpe:2.3:a:guido_frassetto:sedum:2.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-g6fh-mr9f-jrcx | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
CVE-2022-24156 | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetVirtualSer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter. | [
"cpe:2.3:o:tenda:ax3_firmware:16.03.12.10_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2024-34619 | Improper input validation in librtp.so prior to SMR Aug-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability. | [
"cpe:2.3:a:samsung_mobile:samsung_mobile_devices:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2006-6389 | Multiple cross-site scripting (XSS) vulnerabilities in ac4p Mobile allow remote attackers to inject arbitrary web script or HTML via the (1) Taaa parameter to (a) up.php, or the (2) pollhtml and (3) Bloks parameters to (b) polls.php, different vectors than CVE-2006-5770. | [
"cpe:2.3:a:ac4p:ac4p_mobile:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-43236 | Microsoft Message Queuing Information Disclosure Vulnerability | Microsoft Message Queuing Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2366:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1977:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.405:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1415:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1415:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1415:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19145:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19145:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4825:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4825:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4825:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25796:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25796:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20207:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20207:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21309:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21309:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25796:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23545:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23540:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20207:*:*:*:*:*:x64:*"
] | null | 7.5 | null | null |
PYSEC-2022-295 | null | Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8. | [] | null | null | null | null |
GHSA-9m4j-24c8-q3mj | A vulnerability in the Admin portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to recover service account passwords that are saved on an affected system.
The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin portal. An attacker with read or write access to the Admin portal could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | [] | null | 4.3 | null | null |
|
GHSA-9x43-5qcq-h79q | Django Grappelli Open Redirect vulnerability | views/switch.py in django-grappelli (aka Django Grappelli) before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack. | [] | 5.3 | 6.1 | null | null |
CVE-2023-34923 | XML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation. | [
"cpe:2.3:a:topdesk:topdesk:12.10.12:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
GHSA-fr3w-j4xg-gwmq | Admin/users.php in Snaps! Gallery 1.4.4 allows remote attackers to change arbitrary usernames and passwords via the (1) username, or the (2) password and password2 parameters in an edit action. | [] | null | null | null | null |
|
GHSA-g5x5-8m9h-cpvx | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.4 | null | null |
|
CVE-2021-20414 | IBM Guardium Data Encryption (GDE) 3.0.0.2 could allow a user to bruce force sensitive information due to not properly limiting the number of interactions. IBM X-Force ID: 196216. | [
"cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*"
] | null | null | 4.4 | null |
|
CVE-2008-5633 | SQL injection vulnerability in register.asp in ActiveVotes 2.2 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters, possibly related to start.asp. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:activewebsoftwares:activevotes:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4r64-87qc-pvvg | A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The handling of arguments such as IP addresses in the CLI of affected devices is prone to buffer overflows. This could allow an authenticated remote attacker to execute arbitrary code on the device. | [] | null | 8.8 | null | null |
|
GHSA-xg4r-75h7-2cgv | jpegoptim.c in jpegoptim 1.4.5 (fixed in 1.4.6) has an invalid use of realloc() and free(), which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. | [] | null | null | 8.8 | null |
|
CVE-2005-0074 | Buffer overflow in pcdsvgaview in xpcd 2.08 allows local users to execute arbitrary code. | [
"cpe:2.3:a:xpcd:xpcd:2.08:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-5f46-2wpv-265h | Buffer overflow in sa_snap in the bos.esagent fileset in IBM AIX 6.1, 5.3, and earlier and VIOS 2.1, 1.5, and earlier allows local users to leverage system group membership and gain privileges via unspecified vectors. | [] | null | null | null | null |
|
ICSMA-18-137-01 | Medtronic N'Vision Clinician Programmer (Update A) | The affected product does not encrypt the following sensitive information while at rest: PII - Personally Identifiable Information. Some combination of personal data that enables the unique identification of an individual. PII is defined as information that can be used to distinguish or trace an individual 's identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.PHI - Protected Health Information. Some combination of PII and associated health related data.CVE-2018-8849 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The 8840 Clinician Programmer executes the application program from the 8870 Application Card. An attacker with physical access to an 8870 Application Card and sufficient technical capability can modify the contents of this card, including the binary executables. If modified to bypass protection mechanisms, this malicious code will be run when the card is inserted into an 8840 Clinician Programmer.CVE-2018-10631 has been assigned to this vulnerability. A CVSS v3 basescore of 6.3 has been assigned; the CVSS vector string is (AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 6.3 | null |
GHSA-wm23-hcgv-w4x3 | A credential exposure vulnerability in Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08, v01.07, and Display v1.4, v1.2 allows unauthorized attackers to access credentials in plaintext. | [] | null | 7.5 | null | null |
|
GHSA-22vx-6323-v265 | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672003. | [] | null | 6.7 | null | null |
|
GHSA-hcff-4p4q-xjmc | A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page). | [] | null | 5.9 | null | null |
|
GHSA-jc5h-2p2w-pc95 | Cross-site scripting (XSS) vulnerability in the My Calendar plugin before 1.10.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] | null | null | null | null |
|
GHSA-6pqp-3jf8-m667 | Symantec Endpoint Protection Manager, prior to 14.3, has a race condition in client remote deployment which may result in an elevation of privilege on the remote machine. | [] | null | null | null | null |
|
CVE-2016-0597 | Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. | [
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2018-11849 | Lack of check on out of range of bssid parameter When processing scan start command will lead to buffer flow in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8996AU, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, QCA9886, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016 | [
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9378_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2023-39058 | An information leak in THE_B_members card v13.6.1 allows attackers to obtain the channel access token and send crafted messages. | [
"cpe:2.3:a:the_b_members_card_project:the_b_members_card:13.6.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2022-49702 | btrfs: fix hang during unmount when block group reclaim task is running | In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix hang during unmount when block group reclaim task is running
When we start an unmount, at close_ctree(), if we have the reclaim task
running and in the middle of a data block group relocation, we can trigger
a deadlock when stopping an async reclaim task, producing a trace like the
following:
[629724.498185] task:kworker/u16:7 state:D stack: 0 pid:681170 ppid: 2 flags:0x00004000
[629724.499760] Workqueue: events_unbound btrfs_async_reclaim_metadata_space [btrfs]
[629724.501267] Call Trace:
[629724.501759] <TASK>
[629724.502174] __schedule+0x3cb/0xed0
[629724.502842] schedule+0x4e/0xb0
[629724.503447] btrfs_wait_on_delayed_iputs+0x7c/0xc0 [btrfs]
[629724.504534] ? prepare_to_wait_exclusive+0xc0/0xc0
[629724.505442] flush_space+0x423/0x630 [btrfs]
[629724.506296] ? rcu_read_unlock_trace_special+0x20/0x50
[629724.507259] ? lock_release+0x220/0x4a0
[629724.507932] ? btrfs_get_alloc_profile+0xb3/0x290 [btrfs]
[629724.508940] ? do_raw_spin_unlock+0x4b/0xa0
[629724.509688] btrfs_async_reclaim_metadata_space+0x139/0x320 [btrfs]
[629724.510922] process_one_work+0x252/0x5a0
[629724.511694] ? process_one_work+0x5a0/0x5a0
[629724.512508] worker_thread+0x52/0x3b0
[629724.513220] ? process_one_work+0x5a0/0x5a0
[629724.514021] kthread+0xf2/0x120
[629724.514627] ? kthread_complete_and_exit+0x20/0x20
[629724.515526] ret_from_fork+0x22/0x30
[629724.516236] </TASK>
[629724.516694] task:umount state:D stack: 0 pid:719055 ppid:695412 flags:0x00004000
[629724.518269] Call Trace:
[629724.518746] <TASK>
[629724.519160] __schedule+0x3cb/0xed0
[629724.519835] schedule+0x4e/0xb0
[629724.520467] schedule_timeout+0xed/0x130
[629724.521221] ? lock_release+0x220/0x4a0
[629724.521946] ? lock_acquired+0x19c/0x420
[629724.522662] ? trace_hardirqs_on+0x1b/0xe0
[629724.523411] __wait_for_common+0xaf/0x1f0
[629724.524189] ? usleep_range_state+0xb0/0xb0
[629724.524997] __flush_work+0x26d/0x530
[629724.525698] ? flush_workqueue_prep_pwqs+0x140/0x140
[629724.526580] ? lock_acquire+0x1a0/0x310
[629724.527324] __cancel_work_timer+0x137/0x1c0
[629724.528190] close_ctree+0xfd/0x531 [btrfs]
[629724.529000] ? evict_inodes+0x166/0x1c0
[629724.529510] generic_shutdown_super+0x74/0x120
[629724.530103] kill_anon_super+0x14/0x30
[629724.530611] btrfs_kill_super+0x12/0x20 [btrfs]
[629724.531246] deactivate_locked_super+0x31/0xa0
[629724.531817] cleanup_mnt+0x147/0x1c0
[629724.532319] task_work_run+0x5c/0xa0
[629724.532984] exit_to_user_mode_prepare+0x1a6/0x1b0
[629724.533598] syscall_exit_to_user_mode+0x16/0x40
[629724.534200] do_syscall_64+0x48/0x90
[629724.534667] entry_SYSCALL_64_after_hwframe+0x44/0xae
[629724.535318] RIP: 0033:0x7fa2b90437a7
[629724.535804] RSP: 002b:00007ffe0b7e4458 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[629724.536912] RAX: 0000000000000000 RBX: 00007fa2b9182264 RCX: 00007fa2b90437a7
[629724.538156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000555d6cf20dd0
[629724.539053] RBP: 0000555d6cf20ba0 R08: 0000000000000000 R09: 00007ffe0b7e3200
[629724.539956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[629724.540883] R13: 0000555d6cf20dd0 R14: 0000555d6cf20cb0 R15: 0000000000000000
[629724.541796] </TASK>
This happens because:
1) Before entering close_ctree() we have the async block group reclaim
task running and relocating a data block group;
2) There's an async metadata (or data) space reclaim task running;
3) We enter close_ctree() and park the cleaner kthread;
4) The async space reclaim task is at flush_space() and runs all the
existing delayed iputs;
5) Before the async space reclaim task calls
btrfs_wait_on_delayed_iputs(), the block group reclaim task which is
doing the data block group relocation, creates a delayed iput at
replace_file_extents() (called when COWing leaves that have file extent
items pointing to relocated data exten
---truncated--- | [] | null | null | null | null |
CVE-2020-7957 | The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists. This causes a denial of service in which the recipient cannot read all of their messages. | [
"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | null | 3.1 | null |
|
CVE-2020-27029 | In TextView of TextView.java, there is a possible app hang due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-140218875 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2014-3406 | Race condition in the IP logging feature in Cisco Intrusion Prevention System (IPS) Software 7.1(7)E4 and earlier allows remote attackers to cause a denial of service (device reload) via crafted IP traffic that matches a problematic rule, aka Bug ID CSCud82085. | [
"cpe:2.3:a:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2006-1810 | Multiple cross-site scripting (XSS) vulnerabilities in FlexBB 0.5.5 BETA allow remote attackers to inject arbitrary web script or HTML via the (1) ICQ, (2) AIM, (3) MSN, (4) Google Talk, (5) Website Name, (6) Website Address, (7) Email Address, (8) Location, (9) Signature, and (10) Sub-Titles fields in the user profile. | [
"cpe:2.3:a:flexbb:flexbb:0.5.5_beta:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
GHSA-h4x7-365q-3rm3 | In version 0.0.14 of transformeroptimus/superagi, the API endpoint `/api/users/get/{id}` returns the user's password in plaintext. This vulnerability allows an attacker to retrieve the password of another user, leading to potential account takeover. | [] | null | null | 6.5 | null |
|
GHSA-qv97-5qr8-2266 | Mithril snapshots for Cardano database could be compromised by an adversary | ImpactMithril certification of Cardano databaseThe Mithril network provides certification for snapshots of the Cardano database, enabling users to quickly bootstrap a Cardano node without relying on the slower peer-to-peer synchronization process.To generate a multi-signature, a minimum threshold of Cardano stake registered in the protocol must agree on signing the same message. In this context, a digest is computed from the internal files of the Cardano node's database. However, this mechanism has certain limitations. Specifically, some files are not identically generated across all Cardano nodes, and there is no API to provide consistent snapshots at a specific beacon on the Cardano chain:All immutable files, except the last one (which is still being created), are used to compute the messageThe last immutable file is excluded from the signatureThe ledger state files are also excluded from the signature.Cardano node startup sequenceA Cardano node can only perform a fast bootstrap if a pre-computed ledger state is loaded into its database; otherwise, a full re-computation is required, which is time-consuming. During the startup phase with a pre-computed ledger state, the node performs structural verification of the ledger state and lightweight conformity checks which may not be enough to systematically detect invalid ledger state.Attack scenariosInconsistencies could be introduced into a tampered ledger state distributed through Mithril snapshots, either by an unknown source or by a compromised IOG-operated aggregator. These inconsistencies would not be immediately detected by Cardano nodes started with such snapshots, potentially enabling long-range attacks that might not be corrected by honest nodes, even if they sync from genesis.Currently, a Mithril network has only one aggregator, which serves snapshots from a secure cloud location operated by IOG and is therefore assumed to be trustworthy. In the future, as Mithril networks become more decentralized, multiple aggregators will operate independently. This increased decentralization could raise the risk of a malicious aggregator distributing a tampered ledger state.PatchesAs a mitigation, the Mithril aggregator now signs the ledger state snapshot and the latest immutable file using an IOG-owned key, and the client library and CLI validate the signature of these files upon download.The **Mithril client library** has been fixed with version `0.12.2`, **previous versions must not be used anymore**.The **Mithril client CLI** has been fixed with version `0.12.1`, **previous versions must not be used anymore**.The **Mithril aggregator** has been fixed with version `0.7.44`, **previous versions must not be used anymore**.References_Mithril protocol in depth_: https://mithril.network/doc/next/mithril/mithril-protocol/protocol_Bootstrap a Cardano node_: https://mithril.network/doc/manual/getting-started/bootstrap-cardano-node_Mithril certification of the Cardano node database_: https://mithril.network/doc/mithril/advanced/mithril-certification/cardano-node-database | [] | null | 4.9 | null | null |
GHSA-pwqr-x6x9-wjxj | The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324. | [] | null | null | null | null |
|
GHSA-r528-86qh-f3j2 | Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434. | [] | null | 8.8 | null | null |
|
GHSA-x5xm-f46c-5cpq | The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections: <transport-config confidentiality="required" trust-in-target="supported"/> | [] | null | null | 5.9 | null |
|
CVE-2023-21849 | Vulnerability in the Oracle Applications DBA product of Oracle E-Business Suite (component: Java utils). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications DBA. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Applications DBA accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). | [
"cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-w3hw-m3gc-94cr | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R6100 before 1.0.1.20, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62. | [] | null | null | null | null |
|
GHSA-fq9p-mw8p-ccwj | Martin Lambers msmtp before 1.4.19, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | [] | null | null | null | null |
|
RHSA-2019:3775 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: use-after-free in audio chromium-browser: use-after-free in PDFium | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 7.5 | null |
CVE-2017-16933 | etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link. | [
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
CVE-2017-0423 | An elevation of privilege vulnerability in Bluetooth could enable a proximate attacker to manage access to documents on the device. This issue is rated as Moderate because it first requires exploitation of a separate vulnerability in the Bluetooth stack. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32612586. | [
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] | null | null | 5.3 | 2.9 |
|
CVE-2014-3102 | Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.0 through 7.0.0.2 CF28 and 8.0.0 before 8.0.0.1 CF13 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2017-0666 | A elevation of privilege vulnerability in the Android framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37285689. | [
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-f597-cfqv-vq9x | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | 5.5 | null |
|
CVE-2022-24086 | Adobe Commerce checkout improper input validation leads to remote code execution | Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution. | [
"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.7:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.7:p2:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.3:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.3:p1:*:*:commerce:*:*:*"
] | null | 9.8 | null | null |
GHSA-h8hg-357g-gr7f | In the Linux kernel, the following vulnerability has been resolved:net: pktgen: fix access outside of user given buffer in pktgen_thread_write()Honour the user given buffer size for the strn_len() calls (otherwise
strn_len() will access memory outside of the user given buffer). | [] | null | null | null | null |
|
GHSA-82c2-gvr4-jj72 | Access permission verification vulnerability in the ringtone setting module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [] | null | 5.1 | null | null |
|
RHSA-2011:1349 | Red Hat Security Advisory: rpm security update | rpm: crashes and overflows on malformed header | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
CVE-2024-42033 | Access control vulnerability in the security verification module
mpact: Successful exploitation of this vulnerability will affect integrity and confidentiality. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 6.9 | null | null |
|
GHSA-fp6x-72cw-rg73 | OWASP Stinger before 2.5 allows remote attackers to bypass input validation routines by using multipart encoded requests instead of form-urlencoded requests. NOTE: this might be used to expose vulnerabilities in applications that would otherwise be protected by the validation routines. | [] | null | null | null | null |
|
GHSA-j2p9-f4vx-cp2g | The ImageMagick Engine ImageMagick Engine WordPress plugin before 1.7.11 for WordPress is vulnerable to OS Command Injection via the "cli_path" parameter. This allows authenticated attackers, with administrator-level permission to execute arbitrary OS commands on the server leading to remote code execution. | [] | null | 7.2 | null | null |
|
GHSA-fhcg-89c3-g9hx | ASP-DEv XM Events Diary stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for diary.mdb. | [] | null | null | null | null |
|
CVE-2011-0676 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-wcxw-73gx-3286 | GAuth 0.9.9 beta has stored XSS that shows a popup repeatedly and discloses cookies. | [] | null | null | 6.1 | null |
|
GHSA-v7v7-wc5f-6hhc | Double free vulnerability in DfFromLB in docfile.cxx in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service via a crafted fpx image. | [] | null | null | 6.5 | null |
|
CVE-2004-0202 | IDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet. | [
"cpe:2.3:a:microsoft:directx:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:7.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:8.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:8.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:8.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:9.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:directx:9.0b:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2005:114 | Red Hat Security Advisory: imap security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
GHSA-32wh-2cq7-f29f | A vulnerability was found in CodeAstro Blood Donor Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /pages/deletedannounce.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
ICSA-24-051-01 | Commend WS203VICM | A remote, unauthenticated attacker may be able to send crafted messages to the web server of the Commend WS203VICM causing the system to restart, interrupting service. A remote attacker may be able to bypass access control of Commend WS203VICM by creating a malicious request. A weak encoding is used to transmit credentials for WS203VICM. | [] | null | 5.7 | null | null |
GHSA-m935-chfp-9f63 | Arbitrary file write vulnerability in Jenkins Cobertura Plugin | An arbitrary file write vulnerability in Jenkins Cobertura Plugin 1.15 and earlier allows attackers able to control the coverage report file contents to overwrite any file on the Jenkins master file system. Cobertura Plugin 1.16 sanitizes the file paths to prevent escape from the base directory. | [] | null | 6.5 | null | null |
CVE-2017-9872 | The III_dequantize_sample function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file. | [
"cpe:2.3:a:lame_project:lame:3.99.5:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-gfh5-53xq-j227 | A argument injection vulnerability in the 'packet-trace' CLI command of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to execute arbitrary OS commands by including crafted arguments to the CLI command. | [] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.