id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-32794 | WordPress WooCommerce Product Add-ons Plugin <= 6.1.3 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Add-Ons plugin <= 6.1.3 versions. | [
"cpe:2.3:a:woocommerce:product_addons:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
GHSA-wcff-cj33-xw4g | A command execution vulnerability exists in the clish art2 functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2021-30618 | Chromium: CVE-2021-30618 Inappropriate implementation in DevTools | [
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2019-1758 | Cisco IOS Software Catalyst 6500 Series 802.1x Authentication Bypass Vulnerability | A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the attacker to intermittently obtain access to the network. | [
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svg3d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svi1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svm3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svn2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svo1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svp2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m12c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)jn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf35:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ji2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3b:*:*:*:*:*:*:*"
] | null | null | 4.7 | null |
CVE-2010-2709 | Stack-based buffer overflow in webappmon.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long OvJavaLocale value in a cookie. | [
"cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-qhq3-7wmm-8wm6 | Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.emailReg function. The vulnerability can be triggered via the `pt["email"]` parameter. | [] | null | 8.6 | null | null |
|
GHSA-g8w9-9vp7-w33m | SAP NetWeaver AS JAVA 7.4 allows remote attackers to cause a Denial of Service (null pointer exception and icman outage) via an HTTPS request to the sap.com~P4TunnelingApp!web/myServlet URI, aka SAP Security Note 2313835. | [] | null | 7.5 | null | null |
|
CVE-2023-20597 |
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
| [
"cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5965wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4300g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4300ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4600g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4600ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700s_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625c_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6900hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6900hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6980hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6980hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6980hx:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-m3g7-wrrq-v5c8 | Pyload contains Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32. The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session. This issue is patched in version 0.5.0b3.dev32. | [] | null | 5.3 | null | null |
GHSA-v92r-jqh2-f2xx | The Event Tickets and Registration plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.8.2 via the RSVP functionality. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including emails and street addresses. | [] | null | 4.3 | null | null |
|
GHSA-44c3-rvfv-fxw4 | Cross-site scripting (XSS) vulnerability in Mantis before 1.1.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to the "Most active bugs" summary. | [] | null | null | null | null |
|
CVE-2019-1631 | Cisco Integrated Management Controller Information Disclosure Vulnerability | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to access potentially sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow an attacker to view sensitive system data. | [
"cpe:2.3:a:cisco:integrated_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:4.0\\(1c\\)hs3:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
GHSA-r7m8-pv7c-r2ph | The Email Subscribers by Icegram Express WordPress plugin before 5.7.45 does not sanitise and escape some of its form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 4.8 | null | null |
|
GHSA-2pqv-gjx5-j94f | A potential vulnerability has been identified in HP Remote Graphics Software’s certificate authentication process version 7.5.0 and earlier. | [] | null | null | 9.1 | null |
|
GHSA-3w3f-p282-mrp9 | Cross-site scripting (XSS) vulnerability in the logon page in Web Reporting Tools portal in Websense Enterprise and Web Security Suite 6.3 allows remote attackers to inject arbitrary web script or HTML via the username field. | [] | null | null | null | null |
|
GHSA-42qv-x26x-fjv9 | Directory traversal vulnerability in inc/functions.inc.php in CuteNews 1.4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to include arbitrary files via a .. (dot dot) sequence and trailing NULL (%00) byte in the archive parameter in an HTTP POST or COOKIE request, which bypasses a sanity check that is only applied to a GET request. | [] | null | null | null | null |
|
RHSA-2019:0886 | Red Hat Security Advisory: AMQ Clients 2.3.1 release and security update | qpid-proton: TLS Man in the Middle Vulnerability | [
"cpe:/a:redhat:a_mq_clients:2::el6",
"cpe:/a:redhat:a_mq_clients:2::el7"
] | null | null | 7.4 | null |
CVE-2022-37027 | Ahsay AhsayCBS 9.1.4.0 allows an authenticated system user to inject arbitrary Java JVM options. Administrators that can modify the Runtime Options in the web interface can inject Java Runtime Options. These take effect after a restart. For example, an attacker can enable JMX services and consequently achieve remote code execution as the system user. | [
"cpe:2.3:a:ahsay:cloud_backup_suite:9.1.4.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-4mwq-m8xw-34mr | Microsoft DWM Core Library Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-wm3f-xqqj-vggp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bilal TAS Responsivity allows Reflected XSS. This issue affects Responsivity: from n/a through 0.0.6. | [] | null | 7.1 | null | null |
|
GHSA-75qm-74mm-2c33 | The file-upload feature in Cisco Identity Services Engine (ISE) allows remote authenticated users to cause a denial of service (disk consumption and administration-interface outage) by uploading many files, aka Bug ID CSCui67519. | [] | null | null | null | null |
|
GHSA-8jcc-7w3m-qv8c | Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table. | [] | null | null | null | null |
|
GHSA-gf37-7jp8-4qpf | Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody. | [] | null | 5.3 | null | null |
|
CVE-2024-7531 | Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:128.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-m253-34jg-p94g | Buffer overflow in the WRF parsing functionality in the Cisco WebEx Recording Format (WRF) player T26 before SP49 EP40 and T27 before SP28 allows remote attackers to execute arbitrary code via a crafted WRF file. | [] | null | null | null | null |
|
CVE-2005-3277 | The LPD service in HP-UX 10.20 11.11 (11i) and earlier allows remote attackers to execute arbitrary code via shell metacharacters ("`" or single backquote) in a request that is not properly handled when an error occurs, as demonstrated by killing the connection, a different vulnerability than CVE-2002-1473. | [
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2024-7883 | CMSE secure state may leak from stack to floating-point registers | When using Arm Cortex-M Security Extensions (CMSE), Secure stack
contents can be leaked to Non-secure state via floating-point registers
when a Secure to Non-secure function call is made that returns a
floating-point value and when this is the first use of floating-point
since entering Secure state. This allows an attacker to read a limited
quantity of Secure stack contents with an impact on confidentiality.
This issue is specific to code generated using LLVM-based compilers. | [] | null | 3.7 | null | null |
GHSA-p4jq-fjvc-qmw3 | Csetup under IRIX allows arbitrary file creation or overwriting. | [] | null | null | null | null |
|
GHSA-57qw-cc2g-pv5p | lxml Cross-site Scripting Via Control Characters | Incomplete blacklist vulnerability in the `lxml.html.clean` module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the `clean_html` function. | [] | 5.3 | 6.1 | null | null |
GHSA-q3rx-8v72-7wq7 | Memory corruption while accessing the memory as payload size is not validated before access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 | [] | null | null | null | null |
|
GHSA-rppr-4h7c-mc9c | A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate. | [] | null | 7.2 | null | null |
|
CVE-2019-1034 | A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1035. | [
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-9p94-wjcw-v5mm | A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf. | [] | null | null | null | null |
|
GHSA-97qg-jqpc-ph2w | NetScaler ADC 10.5, 11.0, 11.1, and 12.0, and NetScaler Gateway 10.5, 11.0, 11.1, and 12.0 allow remote attackers to gain privilege on a target system. | [] | null | null | 9.8 | null |
|
GHSA-6rhp-m485-gcg5 | Opera before 11.62 allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain. | [] | null | null | null | null |
|
CVE-2016-2184 | The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*"
] | null | null | 4.6 | 4.9 |
|
CVE-2024-5957 | This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager. | [
"cpe:2.3:a:trellix:intrusion_prevention_system_manager:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-84c9-cjwm-w46g | Cisco Digital Media Manager 5.2.2 and earlier, and 5.2.3, allows remote authenticated users to execute arbitrary code via vectors involving a URL and an administrative resource, aka Bug ID CSCts63878. | [] | null | null | null | null |
|
GHSA-4fv3-h4mr-w4rv | IBM Emptoris Strategic Supply Management Platform 10.0.0.x through 10.1.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 116739. | [] | null | null | 5.4 | null |
|
CVE-2003-0836 | Stack-based buffer overflow in IBM DB2 Universal Data Base 7.2 before Fixpak 10 and 10a, and 8.1 before Fixpak 2, allows attackers with "Connect" privileges to execute arbitrary code via a LOAD command. | [
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-3255 | Multiple cross-site request forgery (CSRF) vulnerabilities in Xythos Enterprise Document Manager (XEDM) before 5.0.25.8, and 6.x before 6.0.46.1, allow remote authenticated users to execute commands as arbitrary users via (1) a saved Workflow name or (2) the Content-Type HTTP header. NOTE: item 2 also affects the same version numbers of Xythos Digital Locker (XDL). One or both vectors might also affect Xythos WebFile Server. | [
"cpe:2.3:a:xythos:enterprise_document_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
RHSA-2020:3043 | Red Hat Security Advisory: jbig2dec security update | jbig2dec: heap-based buffer overflow in jbig2_image_compose in jbig2_image.c | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
GHSA-jq6q-c5mf-gjcv | Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. | [] | null | null | null | null |
|
GHSA-xccr-4rr9-j42p | SourceCodester Zoo Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via public_html/register_visitor?msg=. | [] | null | 6.1 | null | null |
|
PYSEC-2025-34 | null | The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_server_certificate can exfiltrate data via DNS after deserialization. | [] | null | null | null | null |
CVE-2018-0935 | Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0876, CVE-2018-0889, CVE-2018-0893, and CVE-2018-0925. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
GHSA-73h5-69j6-pq7f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alessandro Staniscia EndomondoWP allows Stored XSS.This issue affects EndomondoWP: from n/a through 0.1.1. | [] | null | 6.5 | null | null |
|
CVE-2024-1245 | Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes | Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N.
| [
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 2.4 | null | null |
GHSA-fvm9-c9qf-h767 | An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID. | [] | 6.9 | 5.3 | null | null |
|
GHSA-ff2g-3pvh-5fjr | Cross-site scripting (XSS) vulnerability in the Submenu Tree module before 6.x-1.5 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-9102 | phpLDAPadmin: Improper Neutralization of Formula Elements | phpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could be interpreted as a command when the file is opened by a spreadsheet product. Thus, this could lead to CSV Formula Injection. NOTE: This vulnerability will not be addressed, the maintainer's position is that it is not the intention of phpLDAPadmin to control what data Administrators can put in their LDAP database, nor filter it on export. | [] | 5 | null | null | null |
CVE-2017-9853 | An issue was discovered in SMA Solar Technology products. All inverters have a very weak password policy for the user and installer password. No complexity requirements or length requirements are set. Also, strong passwords are impossible due to a maximum of 12 characters and a limited set of characters. NOTE: the vendor reports that the 12-character limit provides "a very high security standard." Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected | [
"cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
CVE-2022-22666 | A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2023-30516 | Jenkins Image Tag Parameter Plugin 2.0 improperly introduces an option to opt out of SSL/TLS certificate validation when connecting to Docker registries, resulting in job configurations using Image Tag Parameters that were created before 2.0 having SSL/TLS certificate validation disabled by default. | [
"cpe:2.3:a:jenkins:image_tag_parameter:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | null |
|
GHSA-3x34-6x7v-gx9x | The SendPulse Free Web Push plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3.6 due to incorrect use of the wp_kses_allowed_html function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
|
GHSA-38h4-fx85-qcx7 | Exiv2 allows Use After Free | ImpactA heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are **not** affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fixiso`.PatchesThe bug is fixed in version v0.28.5.ReferencesIssue: https://github.com/Exiv2/exiv2/issues/3168
Fix: https://github.com/Exiv2/exiv2/pull/3174For more informationPlease see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security. | [] | 5.3 | null | null | null |
RHSA-2012:1465 | Red Hat Security Advisory: java-1.5.0-ibm security update | JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (JMX) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2024-23609 | Improper Error Handling Issue in LabVIEW | An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions. | [
"cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-c5xx-92gp-xmp6 | Cross-site scripting (XSS) vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter. | [] | null | null | null | null |
|
CVE-2002-1122 | Buffer overflow in the parsing mechanism for ISS Internet Scanner 6.2.1, when using the license banner HTTP check, allows remote attackers to execute arbitrary code via a long web server response. | [
"cpe:2.3:a:iss:internet_scanner:6.2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-26254 | WoWonder The Ultimate PHP Social Network Platform v4.0.0 was discovered to contain an access control issue which allows unauthenticated attackers to arbitrarily change group ID names. | [
"cpe:2.3:a:wowonder:wowonder:4.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-hp65-4pq5-qqw7 | Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708. | [] | null | null | null | null |
|
CVE-2016-3639 | SAP HANA DB 1.00.091.00.1418659308 allows remote attackers to obtain sensitive topology information via an unspecified HTTP request, aka SAP Security Note 2176128. | [
"cpe:2.3:a:sap:hana_db:1.00.091.00.1418659308:*:*:*:*:*:*:*"
] | null | null | 4.3 | 5 |
|
GHSA-9vvf-w8qx-55jp | Multiple PHP remote file inclusion vulnerabilities in PhpBlock A8.5 allow remote attackers to execute arbitrary PHP code via a URL in the PATH_TO_CODE parameter to (1) script/init/createallimagecache.php, (2) allincludefortick.php and (3) test.php in script/tick/, and (4) modules/dungeon/tick/allincludefortick.php, different vectors than CVE-2008-1776. | [] | null | null | null | null |
|
CVE-2019-1127 | A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1120, CVE-2019-1121, CVE-2019-1122, CVE-2019-1123, CVE-2019-1124, CVE-2019-1128. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2019-5100 | An exploitable integer overflow vulnerability exists in the BMP header parsing functionality of LEADTOOLS 20. A specially crafted BMP image file can cause an integer overflow, potentially resulting in code execution. An attacker can specially craft a BMP image to trigger this vulnerability. | [
"cpe:2.3:a:leadtools:leadtools:20.0.2019.3.15:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
CVE-2024-32758 | exacqVision - Key exchanges | Under certain circumstances the communication between exacqVision Client and exacqVision Server will use insufficient key length and exchange | [
"cpe:2.3:a:johnsoncontrols:exacqvision_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:exacqvision_client:*:*:*:*:*:*:*:*"
] | 9 | null | null | null |
CVE-2023-3049 | File Upload in TMT's Lockcell | Unrestricted Upload of File with Dangerous Type vulnerability in TMT Lockcell allows Command Injection.This issue affects Lockcell: before 15.
| [
"cpe:2.3:o:tmtmakine:lockcell_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tmtmakine:lockcell:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-92f8-4rq9-x3m2 | A vulnerability was found in Intergard SGS 8.7.0. It has been declared as problematic. This vulnerability affects unknown code of the component SQL Query Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234448. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 3.7 | null |
|
GHSA-8mvp-wmc7-j6qf | Trape through 2019-05-08 has SQL injection via the data[2] variable in core/db.py, as demonstrated by the /bs t parameter. | [] | null | null | 9.8 | null |
|
GHSA-rwvh-cvf4-h99r | The SeatReg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'seatreg' shortcode in all versions up to, and including, 1.56.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2022-33740 | Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). | [
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 |
|
CVE-2020-14221 | HCL Digital Experience 8.5, 9.0, and 9.5 exposes information about the server to unauthorized users. | [
"cpe:2.3:a:hcltech:digital_experience:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:digital_experience:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:digital_experience:9.5:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
CVE-2016-5898 | IBM Jazz Reporting Service (JRS) could allow a remote attacker to obtain sensitive information, caused by not restricting JSON serialization. By sending a direct request, an attacker could exploit this vulnerability to obtain sensitive information. | [
"cpe:2.3:a:ibm:jazz_reporting_service:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0.2:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
GHSA-m37p-rm58-x4hc | A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests., aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-0890. | [] | null | 6.5 | null | null |
|
RHSA-2020:2854 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: nfs: use-after-free in svc_process_common() kernel: use after free due to race condition in the video driver leads to local privilege escalation kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c kernel: out-of-bounds write via crafted keycode table Kernel: ppc: kvm: conflicting use of HSTATE_HOST_R1 to store r1 state leads to host stack corruption kernel: use-after-free read in napi_gro_frags() in the Linux kernel kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.3 | 6.5 | null |
CVE-2013-7060 | Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope. | [
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-35956 | btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations | In the Linux kernel, the following vulnerability has been resolved:
btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations
Create subvolume, create snapshot and delete subvolume all use
btrfs_subvolume_reserve_metadata() to reserve metadata for the changes
done to the parent subvolume's fs tree, which cannot be mediated in the
normal way via start_transaction. When quota groups (squota or qgroups)
are enabled, this reserves qgroup metadata of type PREALLOC. Once the
operation is associated to a transaction, we convert PREALLOC to
PERTRANS, which gets cleared in bulk at the end of the transaction.
However, the error paths of these three operations were not implementing
this lifecycle correctly. They unconditionally converted the PREALLOC to
PERTRANS in a generic cleanup step regardless of errors or whether the
operation was fully associated to a transaction or not. This resulted in
error paths occasionally converting this rsv to PERTRANS without calling
record_root_in_trans successfully, which meant that unless that root got
recorded in the transaction by some other thread, the end of the
transaction would not free that root's PERTRANS, leaking it. Ultimately,
this resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount
for the leaked reservation.
The fix is to ensure that every qgroup PREALLOC reservation observes the
following properties:
1. any failure before record_root_in_trans is called successfully
results in freeing the PREALLOC reservation.
2. after record_root_in_trans, we convert to PERTRANS, and now the
transaction owns freeing the reservation.
This patch enforces those properties on the three operations. Without
it, generic/269 with squotas enabled at mkfs time would fail in ~5-10
runs on my system. With this patch, it ran successfully 1000 times in a
row. | [] | null | null | null | null |
CVE-2022-35476 | OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fbc0b. | [
"cpe:2.3:a:otfcc_project:otfcc:0.10.4:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-xw72-4xwq-8588 | An issue was discovered on Samsung mobile devices with N(7.0) software. The time service (aka Timaservice) allows a kernel panic. The Samsung ID is SVE-2017-8593 (May 2017). | [] | null | null | null | null |
|
CVE-2008-6805 | Multiple SQL injection vulnerabilities in Mic_Blog 0.0.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to category.php, the (2) user parameter to login.php, and the (3) site parameter to register.php. | [
"cpe:2.3:a:micgr:mic_blog:0.0.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-v7v4-rfm9-vpp2 | A vulnerability has been identified in the IBM Cloud Orchestrator task API. The task API might allow an authenticated user to view background information associated with actions performed on virtual machines in projects where the user belongs to. | [] | null | null | 5.5 | null |
|
RHSA-2020:0568 | Red Hat Security Advisory: ksh security update | ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | null | null |
CVE-2022-42429 | This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of requests to modify poller broker configuration. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to the level of an administrator. Was ZDI-CAN-18557. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
CVE-2016-0976 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2012-0588 | Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple iOS before 5.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0586, CVE-2012-0587, and CVE-2012-0589. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2014-8140 | Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command. | [
"cpe:2.3:a:unzip_project:unzip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2025-0162 | IBM Aspera Shares XML external entity injection | IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources. | [
"cpe:2.3:a:ibm:aspera_shares:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level7:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2005-4314 | Cross-site scripting (XSS) vulnerability in ppcal.cgi in PPCal Shopping Cart 3.3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) stop and (2) user parameters. | [
"cpe:2.3:a:ppcal_shopping_cart:ppcal_shopping_cart:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2008-3091 | Cross-site scripting (XSS) vulnerability in the Taxonomy Autotagger module 5.x before 5.x-1.8 for Drupal allows remote authenticated users, with create or edit post permissions, to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:taxonomy_autotagger_module:5:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2018-14829 | Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code. | [
"cpe:2.3:a:rockwellautomation:rslinx:*:*:*:*:classic:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-2q6p-3x6p-8mcf | An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies. | [] | null | 7.1 | null | null |
|
GHSA-q332-7cfx-q6r5 | mojoPortal <=2.9.0.1 is vulnerable to Directory Traversal via BetterImageGallery API Controller - ImageHandler Action. An attacker can exploit this vulnerability to access the Web.Config file and obtain the MachineKey. | [] | null | 6.5 | null | null |
|
GHSA-f82h-p853-m78w | Cross-Site Request Forgery (CSRF) vulnerability in Praveen Goswami Advanced Category Template.This issue affects Advanced Category Template: from n/a through 0.1. | [] | null | 5.4 | null | null |
|
CVE-2017-14005 | An Unverified Password Change issue was discovered in ProMinent MultiFLEX M10a Controller web interface. When setting a new password for a user, the application does not require the user to know the original password. An attacker who is authenticated could change a user's password, enabling future access and possible configuration changes. | [
"cpe:2.3:o:prominent:multiflex_m10a_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:prominent:multiflex_m10a_controller:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-2015-1711 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658, CVE-2015-1706, CVE-2015-1717, and CVE-2015-1718. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-ffhw-4rgr-f8x2 | A vulnerability was found in code-projects Simple Chat System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /add_user.php. The manipulation of the argument name/email/password/number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2022-0990 | Server-Side Request Forgery (SSRF) in janeczku/calibre-web | Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18. | [
"cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*"
] | null | null | 9.3 | null |
GHSA-7wfw-45qm-cwxf | An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975. | [] | null | 7.8 | null | null |
|
CVE-2024-23749 | KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution. | [
"cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.