id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-whvw-59jf-hrx9
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.
[]
null
6.7
null
null
GHSA-46q2-9g95-42vx
A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via 'Comments' while saving Config Revisions.
[]
null
null
5.4
null
RHSA-2023:7528
Red Hat Security Advisory: fence-agents security update
python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::highavailability", "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" ]
null
5.9
null
null
CVE-2014-3157
Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.114:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.115:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.116:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.117:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.118:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.119:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.120:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.121:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.122:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.123:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.125:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.126:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.127:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.128:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.137:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.138:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.140:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.141:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.142:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.149:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.150:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.151:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-jr92-qqhw-35jg
Directory traversal vulnerability in BitZipper 4.1.2 SR-1 and earlier allows remote attackers to create files in arbitrary directories via a .. (dot dot) in the filename of a file that is stored in a (1) RAR (.rar), (2) TAR (.tar), (3) ZIP (.zip), (4) GZ (.gz), or (5) JAR (.jar) archive.
[]
null
null
null
null
CVE-2023-2669
SourceCodester Lost and Found Information System GET Parameter sql injection
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as critical. This affects an unknown part of the file admin/?page=categories/view_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228885 was assigned to this vulnerability.
[ "cpe:2.3:a:oretnom23:lost_and_found_information_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-3jc2-hr74-22gv
The Twitter No Background (aka com.wTwitternobackground) application 0.85.13509.97828 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-x3jh-vmwp-wc2j
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1092.
[]
null
null
null
null
GHSA-mjjx-mm3w-x2f2
The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.
[]
null
null
null
null
GHSA-xh9q-jvq8-p253
In showNextSecurityScreenOrFinish of KeyguardSecurityContainerController.java, there is a possible way to access the lock screen during device setup due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
CVE-2023-38588
Archer C3150 firmware versions prior to 'Archer C3150(JP)_V2_230511' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.
[ "cpe:2.3:o:tp-link:archer_c3150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_c3150:2.0:*:*:*:*:*:*:*" ]
null
8
null
null
GHSA-4p2f-cf4h-825m
In sendBugreportNotification of BugreportProgressService.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-178803845
[]
null
7.8
null
null
GHSA-4mrw-m8gp-8hgx
A vulnerability in the Graphite interface of Cisco HyperFlex software could allow an authenticated, local attacker to write arbitrary data to the Graphite interface. The vulnerability is due to insufficient authorization controls. An attacker could exploit this vulnerability by connecting to the Graphite service and sending arbitrary data. A successful exploit could allow the attacker to write arbitrary data to Graphite, which could result in invalid statistics being presented in the interface. Versions prior to 3.5(2a) are affected.
[]
null
3.3
null
null
CVE-2022-24743
Insufficient Session Expiration in Sylius
Sylius is an open source eCommerce platform. Prior to versions 1.10.11 and 1.11.2, the reset password token was not set to null after the password was changed. The same token could be used several times, which could result in leak of the existing token and unauthorized password change. The issue is fixed in versions 1.10.11 and 1.11.2. As a workaround, overwrite the `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class with code provided by the maintainers and register it in a container. More information about this workaround is available in the GitHub Security Advisory.
[ "cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2024-45553
Use After Free in DSP Services
Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise.
[ "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:flight_rb5_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc5:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:robotics_rb5:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4635:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7635:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_460_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_460_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_662_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_662_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:talynplus:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2000-1138
Lotus Notes R5 client R5.0.5 and earlier does not properly warn users when an S/MIME email message has been modified, which could allow an attacker to modify the email in transit without being detected.
[ "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:5.0.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-27227
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
[ "cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
GHSA-2jw4-27vv-49jx
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 4.0.27.
[]
null
8.5
null
null
CVE-2006-3342
Cross-site scripting (XSS) vulnerability in index.php in Arctic 1.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search cmd.
[ "cpe:2.3:a:olate:arctic:*:*:*:*:*:*:*:*" ]
null
null
null
2.6
CVE-2024-55590
Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands.
[]
null
8.6
null
null
CVE-2024-6828
Redux Framework 4.4.12 - 4.4.17 - Unauthenticated JSON File Upload to Stored Cross-Site Scripting
The Redux Framework plugin for WordPress is vulnerable to unauthenticated JSON file uploads due to missing authorization and capability checks on the Redux_Color_Scheme_Import function in versions 4.4.12 to 4.4.17. This makes it possible for unauthenticated attackers to upload JSON files, which can be used to conduct stored cross-site scripting attacks and, in some rare cases, when the wp_filesystem fails to initialize - to Remote Code Execution.
[ "cpe:2.3:a:redux:gutenberg_template_library_\\&_redux_framework:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
RHSA-2023:2626
Red Hat Security Advisory: emacs security update
emacs: command execution via shell metacharacters emacs: local command injection in ruby-mode.el emacs: command injection vulnerability in htmlfontify.el emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
CVE-2020-15530
An issue was discovered in Valve Steam Client 2.10.91.91. The installer allows local users to gain NT AUTHORITY\SYSTEM privileges because some parts of %PROGRAMFILES(X86)%\Steam and/or %COMMONPROGRAMFILES(X86)%\Steam have weak permissions during a critical time window. An attacker can make this time window arbitrarily long by using opportunistic locks.
[ "cpe:2.3:a:valvesoftware:steam_client:2.10.91.91:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2005-2595
Cross-site scripting (XSS) vulnerability in Dada Mail before 2.10 Alpha 1 allows remote attackers to execute arbitrary Javascript via archived messages.
[ "cpe:2.3:a:dada_mail:dada_mail:2.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.12_beta:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.13_alpha1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.13_alpha2:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.14_alpha1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.14_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.14_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.14_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.15_alpha1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.15_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.15_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.16_alpha1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.16_alpha2:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.16_alpha3:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.8.16_alpha4:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.9.0_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.9.0_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.9.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:dada_mail:dada_mail:2.9.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-mjrg-rf9g-9j6r
An issue was discovered in the function expr6 in eval.c in Netwide Assembler (NASM) through 2.14.02. There is a stack exhaustion problem caused by the expr6 function making recursive calls to itself in certain scenarios involving lots of '!' or '+' or '-' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted asm file.
[]
null
null
5.5
null
GHSA-6723-6vgh-jm2c
Insufficient data validation in V8 builtins string generator could lead to out of bounds read and write access in V8 in Google Chrome prior to 62.0.3202.94 and allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
[]
null
null
8.8
null
GHSA-qxx3-fwc4-2mv7
A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext.
[]
null
4.2
null
null
CVE-2006-0669
Multiple SQL injection vulnerabilities in archive.asp in GA's Forum Light allow remote attackers to execute arbitrary SQL commands via the (1) Forum and (2) pages parameter. NOTE: SecurityTracker says that the vendor has disputed this issue, saying that GA Forum Light does not use an SQL database. SecurityTracker's research indicates that the original problem could be due to a vbscript parsing error based on invalid arguments
[ "cpe:2.3:a:gasoft:gas_forum_light:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2013-6058
SQL injection vulnerability in appRain CMF 3.0.2 and earlier allows remote attackers to execute arbitrary SQL commands via the PATH_INFO to blog-by-cat/.
[ "cpe:2.3:a:apprain:apprain:*:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:0.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apprain:apprain:3.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-49502
media: rga: fix possible memory leak in rga_probe
In the Linux kernel, the following vulnerability has been resolved: media: rga: fix possible memory leak in rga_probe rga->m2m_dev needs to be freed when rga_probe fails.
[]
null
5.5
null
null
GHSA-j6x8-v233-x3mm
Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions.
[]
null
5.9
null
null
GHSA-h92x-hphp-84mq
PHP remote file inclusion vulnerability in gestion/savebackup.php in Gepi 1.4.0 and earlier, and possibly other versions before 1.4.4, allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter.
[]
null
null
null
null
CVE-2017-7644
The Management Web Interface in Palo Alto Networks PAN-OS before 6.1.17, 7.x before 7.0.15, and 7.1.x before 7.1.9 allows remote authenticated users to obtain sensitive information by leveraging incorrect permission validation, aka PAN-SA-2017-0013 and PAN-70541.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.5:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.4:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:7.1.8:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-97p6-2wmw-hgqw
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application.
[]
null
6.5
null
null
CVE-2024-39484
mmc: davinci: Don't strip remove function when driver is builtin
In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g. using sysfs or hotplug), the driver is just removed without the cleanup being performed. This results in resource leaks. Fix it by compiling in the remove callback unconditionally. This also fixes a W=1 modpost warning: WARNING: modpost: drivers/mmc/host/davinci_mmc: section mismatch in reference: davinci_mmcsd_driver+0x10 (section: .data) -> davinci_mmcsd_remove (section: .exit.text)
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-72vg-99qh-3ghw
VMware App Volumes 2.x prior to 2.18.6 and VMware App Volumes 4 prior to 2006 contain a Stored Cross-Site Scripting (XSS) vulnerability. A malicious actor with access to create and edit applications or create storage groups, may be able to inject malicious script which will be executed by a victim's browser when viewing.
[]
null
null
null
null
CVE-2019-19415
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
[ "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-p3ww-q6x5-94x9
Cross-site scripting vulnerability AOL Instant Messenger (AIM) 4.5 and 4.7 for MacOS and Windows allows remote attackers to conduct unauthorized activities, such as adding buddies and groups to a user's buddy list, via a URL with a META HTTP-EQUIV="refresh" tag to an aim: URL.
[]
null
null
null
null
GHSA-v723-8xx7-26gh
Directory traversal vulnerability in the JobScheduler Operations Center (JOC) in SOS JobScheduler before 1.6.4246 and 1.7.x before 1.7.4241 allows remote authenticated users with the info permission to read arbitrary files in the webroot via unspecified vectors.
[]
null
null
null
null
GHSA-q263-j3q9-g964
October CMS PHP Code Execution
October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server.
[]
null
null
7.2
null
CVE-2024-45969
NULL pointer dereference in the MMS Client in MZ Automation LibIEC1850 before commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33 allows a malicious server to Cause a Denial-of-Service via the MMS InitiationResponse message.
[ "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2025-0349
Tenda AC6 GetParentControlInfo stack-based overflow
A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src/mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
8.7
8.8
8.8
9
GHSA-mwxm-jr8w-j55c
Buffer overflow in the login dialog in dbisqlc.exe in SQLAnywhere for Symantec Ghost 8.0 and 8.2, as used in Symantec Ghost Solutions Suite (SGSS) 1.0, might allow local users to read certain sensitive information from the database.
[]
null
null
null
null
GHSA-j64g-fgwq-j479
** DISPUTED ** voidtools Everything before 1.4.1 Beta Nightly 2020-08-18 allows privilege escalation via a Trojan horse urlmon.dll file in the installation directory. NOTE: this is only relevant if low-privileged users can write to the installation directory, which may be considered a site-specific configuration error.
[]
null
7.8
null
null
CVE-2012-3569
Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file.
[ "cpe:2.3:a:vmware:ovf_tool:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:4.0.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2024-12451
HTML5 chat <= 1.04 - Authenticated (Contributor+) Stored Cross-Site Scripting
The HTML5 chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'HTML5CHAT' shortcode in all versions up to, and including, 1.04 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2007-3068
Stack-based buffer overflow in DVD X Player 4.1 Professional allows remote attackers to execute arbitrary code via a PLF playlist containing a long filename.
[ "cpe:2.3:a:dvd_x_studios:dvd_x_player:4.1:*:professional:*:*:*:*:*" ]
null
null
null
6.8
GHSA-v27w-q35g-5rp9
CMS Made Simple 2.2.10 has XSS via the myaccount.php "Email Address" field, which is reachable via the "My Preferences -> My Account" section.
[]
null
null
5.4
null
RHBA-2019:0959
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 images update
xterm.js: Mishandling of special characters allows for remote code execution
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
7.5
null
GHSA-88gx-mvc3-9p77
Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Request Forgery (CSRF) via the WSCView function.
[]
null
5.4
null
null
RHSA-2023:1103
Red Hat Security Advisory: kpatch-patch security update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
CVE-2017-9520
The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file.
[ "cpe:2.3:a:radare:radare2:1.5.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2014-8665
The SAP Business Intelligence Development Workbench allows remote attackers to obtain sensitive information by reading unspecified files.
[ "cpe:2.3:a:sap:business_intelligence_development_workbench:-:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-9m52-47xr-v5f7
CRLF injection vulnerability in www/delivery/ck.php in Openads 2.3 (aka Max Media Manager, MMM) before 0.3.31-alpha-pr3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the destination parameter. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2011-3016
Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving counter nodes, related to a "read-after-free" issue.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-j7jv-2w23-w786
A vulnerability, which was classified as critical, has been found in Tenda O3 1.0.0.10. This issue affects the function formexeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272117 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
8.7
8.8
null
null
CVE-2024-26883
bpf: Fix stackmap overflow check on 32-bit arches
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check on 32-bit arches The stackmap code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing a 32-bit left-shift of an unsigned long value, which is undefined behaviour, so it is not guaranteed to truncate neatly. This was triggered by syzbot on the DEVMAP_HASH type, which contains the same check, copied from the hashtab code. The commit in the fixes tag actually attempted to fix this, but the fix did not account for the UB, so the fix only works on CPUs where an overflow does result in a neat truncation to zero, which is not guaranteed. Checking the value before rounding does not have this problem.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2020-17446
asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.
[ "cpe:2.3:a:magic:asyncpg:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-vvrx-55rg-mhcv
Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/footer.php in Maian Guestbook 3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_script2 and (2) msg_script3 parameters.
[]
null
null
null
null
RHSA-2022:7283
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.6
null
null
CVE-2012-1069
Cross-site scripting (XSS) vulnerability in module/kb/search_word in the search module in lknSupport allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[ "cpe:2.3:a:instantphp:lknsupport:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gf95-pcww-8h2h
Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
9.8
null
null
RHSA-2022:1106
Red Hat Security Advisory: kernel security update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: possible privileges escalation due to missing TLB flush
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7
null
null
CVE-2012-0403
Directory traversal vulnerability in EMC RSA enVision 4.x before 4.1 Patch 4 allows remote authenticated users to have an unspecified impact via unknown vectors.
[ "cpe:2.3:a:rsa:envision:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:rsa:envision:4.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:rsa:envision:4.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:rsa:envision:4.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:rsa:envision:4.1:*:*:*:*:*:*:*" ]
null
null
null
6.3
GHSA-853m-wxj4-w3h5
ZNC 1.8.0 up to 1.8.1-rc1 allows attackers to trigger an application crash (with a NULL pointer dereference) if echo-message is not enabled and there is no network.
[]
null
6.5
null
null
CVE-2016-2826
The maintenance service in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows does not prevent MAR extracted-file modification during updater execution, which might allow local users to gain privileges via a Trojan horse file.
[ "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-h94f-223c-f5mw
Authenticated users with Site roles may inject XSS scripts via file names that will execute in the browser for this and other users of the same site.
[]
null
null
null
null
CVE-2022-32037
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formSetAPCfg.
[ "cpe:2.3:o:tenda:m3_firmware:1.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:m3:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-478v-f3x6-36qh
SQL injection vulnerability in calendar/page.asp in Aleris Web Publishing Server 3.0 allows remote attackers to execute arbitrary SQL commands via the mode parameter.
[]
null
null
null
null
CVE-2009-0996
Unspecified vulnerability in the BI Publisher component in Oracle Application Server 10.1.3.2.1, 10.1.3.3.3, and 10.1.3.4 allows remote authenticated users to affect confidentiality via unknown vectors.
[ "cpe:2.3:a:oracle:application_server:10.1.3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-4rgp-rfp9-r9wv
A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been classified as critical. Affected is an unknown function of the file deactivate.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250566 is the identifier assigned to this vulnerability.
[]
null
6.3
null
null
GHSA-f3jp-5765-7fx9
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
[]
null
null
null
null
GHSA-74wm-5wpv-xxh5
Multiple unspecified vulnerabilities in Adobe Illustrator CS2 on Macintosh allow user-assisted attackers to execute arbitrary code via a crafted AI file.
[]
null
null
null
null
GHSA-hc2w-f6x6-qrc8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.
[]
null
null
null
null
PYSEC-2015-39
null
The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image.
[]
null
null
null
null
CVE-2024-37370
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.
[ "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-mwpc-rq5j-r7mq
SQL injection vulnerability in the Drag & Drop Gallery module 6.x for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2024-42604
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3
[ "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-9m84-hqh3-p3x8
Windows (modem.sys) Information Disclosure Vulnerability
[]
null
5.5
null
null
CVE-2020-27673
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
GHSA-5hh5-pc82-j72r
An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. A vulnerability in the web server allows arbitrary files and configurations to be read via directory traversal over TCP port 8888.
[]
null
7.5
null
null
CVE-2022-27290
D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formSetWanDhcpplus. This vulnerability allows attackers to cause a Denial of Service (DoS) via the curTime parameter.
[ "cpe:2.3:o:dlink:dir-619_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-619:ax:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2016-5882
IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2021-20744
Cross-site scripting vulnerability in EC-CUBE Category contents plugin (for EC-CUBE 3.0 series) versions prior to version 1.0.1 allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation.
[ "cpe:2.3:a:ec-cube:business_form_output:*:*:*:*:*:*:*:*", "cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-2gj8-24rx-v734
IBM API Connect 5.0.0.0 through 5.0.8.3 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 143744.
[]
null
null
5.4
null
GHSA-g7gp-8rqr-gjrh
Multiple SQL injection vulnerabilities in FrontAccounting (FA) before 2.1.7 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to various .inc and .php files in (1) reporting/, (2) sales/, (3) sales/includes/, (4) sales/includes/db/, (5) sales/inquiry/, (6) sales/manage/, (7) sales/view/, (8) taxes/, and (9) taxes/db/.
[]
null
null
null
null
CVE-2009-0443
Stack-based buffer overflow in Elecard AVC HD PLAYER 5.5.90116 allows remote attackers to execute arbitrary code via an M3U file containing a long string in a URL.
[ "cpe:2.3:a:elecard:elecard_avc_hd_player:5.5.90116:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-hh29-7f97-3793
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194963.
[]
null
null
null
null
CVE-2017-5607
Splunk Enterprise 5.0.x before 5.0.18, 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.13.1, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3 and Splunk Light before 6.5.2 assigns the $C JS property to the global Window namespace, which might allow remote attackers to obtain sensitive logged-in username and version-related information via a crafted webpage.
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:light:*:*:*", "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ]
null
null
3.5
3.5
CVE-2015-8425
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
[ "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2022-28313
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16343.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
CVE-2024-13239
Two-factor Authentication (TFA) - Moderately critical - Access bypass - SA-CONTRIB-2024-003
Weak Authentication vulnerability in Drupal Two-factor Authentication (TFA) allows Authentication Abuse.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.5.0.
[]
null
9.8
null
null
GHSA-gq6q-2ffm-3vc2
An issue in Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 allows attackers to access sensitive user information via supplying a crafted link.
[]
null
5.5
null
null
GHSA-qpgf-q5wp-qpqp
Missing Authorization vulnerability in Wow-Company Button Generator – easily Button Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Button Generator – easily Button Builder: from n/a through 2.3.8.
[]
null
5.3
null
null
RHSA-2016:1519
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.6 update
OOME from EAP 6 http management console SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
CVE-2001-1043
ArGoSoft FTP Server 1.2.2.2 allows remote attackers to read arbitrary files and directories by uploading a .lnk (link) file that points to the target file.
[ "cpe:2.3:a:argosoft:ftp_server:1.2.2.2:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2023-27059
A cross-site scripting (XSS) vulnerability in the Edit Group function of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Group Name text field.
[ "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-7680
itsourcecode Tailoring Management System incedit.php sql injection
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:tailoring_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
RHSA-2022:8800
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.1
null
null
CVE-2022-48765
KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
In the Linux kernel, the following vulnerability has been resolved: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC The below warning is splatting during guest reboot. ------------[ cut here ]------------ WARNING: CPU: 0 PID: 1931 at arch/x86/kvm/x86.c:10322 kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm] CPU: 0 PID: 1931 Comm: qemu-system-x86 Tainted: G I 5.17.0-rc1+ #5 RIP: 0010:kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm] Call Trace: <TASK> kvm_vcpu_ioctl+0x279/0x710 [kvm] __x64_sys_ioctl+0x83/0xb0 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fd39797350b This can be triggered by not exposing tsc-deadline mode and doing a reboot in the guest. The lapic_shutdown() function which is called in sys_reboot path will not disarm the flying timer, it just masks LVTT. lapic_shutdown() clears APIC state w/ LVT_MASKED and timer-mode bit is 0, this can trigger timer-mode switch between tsc-deadline and oneshot/periodic, which can result in preemption timer be cancelled in apic_update_lvtt(). However, We can't depend on this when not exposing tsc-deadline mode and oneshot/periodic modes emulated by preemption timer. Qemu will synchronise states around reset, let's cancel preemption timer under KVM_SET_LAPIC.
[]
null
null
null
null