id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9p74-pqx9-3mrw | Vulnerability in the Oracle Argus Safety product of Oracle Health Sciences Applications (component: Letters). The supported version that is affected is 8.2.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety. While the vulnerability is in Oracle Argus Safety, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Argus Safety accessible data. CVSS 3.1 Base Score 5.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N). | []
| null | null | null | null |
|
CVE-2017-14618 | Cross-site scripting (XSS) vulnerability in inc/PMF/Faq.php in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the Questions field in an "Add New FAQ" action. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
]
| null | null | 4.8 | 3.5 |
|
CVE-2019-14664 | In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks. | [
"cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
CVE-2004-0004 | The libCheckSignature function in crypto-utils.lib for OpenCA 0.9.1.6 and earlier only compares the serial of the signer's certificate and the one in the database, which can cause OpenCA to incorrectly accept a signature if the certificate's chain is trusted by OpenCA's chain directory, allowing remote attackers to spoof requests from other users. | [
"cpe:2.3:a:openca:openca:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2012-4002 | Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2012-0678 | Cross-site scripting (XSS) vulnerability in Apple Safari before 6.0 allows remote attackers to inject arbitrary web script or HTML via a feed:// URL. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2023-23929 | Refresh tokens do not expire in Vantage6 | vantage6 is a privacy preserving federated learning infrastructure for secure insight exchange. Currently, the refresh token is valid indefinitely. The refresh token should get a validity of 24-48 hours. A fix was released in version 3.8.0.
| [
"cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
CVE-2008-6424 | Directory traversal vulnerability in FFFTP 1.96b allows remote FTP servers to create or overwrite arbitrary files via a response to an FTP LIST command with a filename that contains a .. (dot dot). | [
"cpe:2.3:a:jun_sota:ffftp:1.96b:*:*:*:*:*:*:*"
]
| null | null | null | 8.8 |
|
GHSA-x3f8-9pw6-9v28 | Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.10CU2 have unknown impact and attack vectors related to (1) Application Object Library (APPS01), (2) Human Resources (APPS03), (3) Payables (APPS04), (4) Trading Community Architecture (APPS05), and (5) Web Applications Desktop Integrator (APPS06). | []
| null | null | null | null |
|
CVE-2022-24937 | Malformed Zigbee packet causes Assert in EmberZNet 7.0.0 or earlier | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Silicon Labs Ember ZNet allows Overflow Buffers. | [
"cpe:2.3:a:silabs:emberznet:1.0.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2018-9923 | An issue was discovered in idreamsoft iCMS through 7.0.7. CSRF exists in admincp.php, as demonstrated by adding an article via an app=article&do=save&frame=iPHP request. | [
"cpe:2.3:a:icmsdev:icms:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
RHSA-2018:0583 | Red Hat Security Advisory: rh-ruby22-ruby security, bug fix, and enhancement update | ruby: DL:: dlopen could open a library with tainted library name ruby: DL:: dlopen could open a library with tainted library name ruby: Buffer underrun vulnerability in Kernel.sprintf rubygems: Escape sequence in the "summary" field of gemspec rubygems: No size limit in summary length of gem spec rubygems: Arbitrary file overwrite due to incorrect validation of specification name rubygems: DNS hijacking vulnerability rubygems: Unsafe object deserialization through YAML formatted gem specifications ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick ruby: Buffer underrun in OpenSSL ASN1 decode ruby: Arbitrary heap exposure during a JSON.generate call ruby: Command injection vulnerability in Net::FTP ruby: Command injection in lib/resolv.rb:lazy_initialize() allows arbitrary code execution | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 8.1 | null |
CVE-2018-10423 | mc-admin/post.php in MiniCMS 1.10 allows remote attackers to obtain a directory listing of the top-level directory of the web root via a link that becomes available after posting an article. | [
"cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*"
]
| null | null | 2.7 | 4 |
|
GHSA-j7pv-hcg7-83ch | Menasoft SPHERE server 0.99x and 0.5x allows remote attackers to cause a denial of service by establishing a large number of connections to the server without providing login credentials, which prevents other users from being able to log in. | []
| null | null | null | null |
|
GHSA-fjhx-vwcj-hrw9 | Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 12.1.0.4 and 12.1.0.5 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Loader Service. | []
| null | null | null | null |
|
GHSA-xv68-rrmw-9xwf | Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field) | ImpactWith access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user's current session.PatchesUpgrade to 4.4.13 or 5.1.1 or later.WorkaroundsNoneReferenceshttps://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_ScriptingIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected]) | []
| 5.1 | 4.8 | null | null |
CVE-2020-7804 | ActiveX Control(HShell.dll) in Handy Groupware 1.7.3.1 for Windows 7, 8, and 10 allows an attacker to execute arbitrary command via the ShellExec method. | [
"cpe:2.3:a:handysoft:groupware:1.7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*"
]
| null | 6.4 | null | null |
|
CVE-2023-49128 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0001:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0002:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0003:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0004:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0005:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0006:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0007:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0008:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0009:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-mgm3-5x33-7mw3 | Cross-site scripting (XSS) vulnerability in modifier.php in EditeurScripts EsNews 1.2 allows remote attackers to inject arbitrary web script or HTML via the msg parameter. | []
| null | null | null | null |
|
CVE-2023-52346 | In modem driver, there is a possible system crash due to improper input validation. This could lead to local information disclosure with System execution privileges needed | []
| null | 4.4 | null | null |
|
GHSA-6pw7-57q6-83j4 | DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `commandTable.` | []
| null | 8 | null | null |
|
CVE-2005-2793 | PHP remote file inclusion vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to execute arbitrary PHP code via the custom_welcome_page parameter. | [
"cpe:2.3:a:phpldapadmin_project:phpldapadmin:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpldapadmin_project:phpldapadmin:0.9.7:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2010-2269 | Directory traversal vulnerability in loadstatic.cgi in Accoria Web Server (aka Rock Web Server) 1.4.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter. | [
"cpe:2.3:a:accoria:rock_web_server:1.4.7:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2025-28866 | WordPress Login Logger plugin <= 1.2.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in smerriman Login Logger allows Cross Site Request Forgery. This issue affects Login Logger: from n/a through 1.2.1. | []
| null | 4.3 | null | null |
RHSA-2020:2893 | Red Hat Security Advisory: bind security update | bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
]
| null | 7.5 | null | null |
GHSA-gg7x-7c85-2fh7 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | []
| null | null | null | null |
|
CVE-2015-5635 | The Newphoria Koritore application before 1.1 for Android and before 1.1 for iOS allows attackers to bypass a URL whitelist protection mechanism and obtain API access via unspecified vectors. | [
"cpe:2.3:a:newphoria_corporation:koritore:*:*:*:*:*:android:*:*",
"cpe:2.3:a:newphoria_corporation:koritore:*:*:*:*:*:ios:*:*"
]
| null | null | null | 6.8 |
|
GHSA-9xw8-39cq-r6j4 | The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package. | []
| null | 5.5 | null | null |
|
CVE-2022-45141 | Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96). | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2004-2532 | Serv-U FTP server before 5.1.0.0 has a default account and password for local administration, which allows local users to execute arbitrary commands by connecting to the server using the default administrator account, creating a new user, logging in as that new user, and then using the SITE EXEC command. | [
"cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.9:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
cisco-sa-finesse-proxy-dos-vY5dQhrV | Cisco Finesse Reverse Proxy VPN-less Access to Finesse Desktop Denial of Service Vulnerability | A vulnerability in the nginx configurations that are provided as part of the VPN-less reverse proxy for Cisco Finesse could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for new and existing users who are connected through a load balancer.
This vulnerability is due to improper IP address filtering by the reverse proxy. An attacker could exploit this vulnerability by sending a series of unauthenticated requests to the reverse proxy. A successful exploit could allow the attacker to cause all current traffic and subsequent requests to the reverse proxy through a load balancer to be dropped, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
| []
| null | 5.3 | null | null |
CVE-2023-41745 | Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. | [
"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
|
GHSA-mw66-fjc2-5mm7 | An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php). | []
| null | null | null | null |
|
CVE-2021-1594 | Cisco Identity Services Engine Privilege Escalation Vulnerability | A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes. | [
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.4\\(0.902\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6\\(0.156\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7\\(0.903\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0\\(0.458\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1\\(0.440\\):*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
CVE-2019-12426 | an unauthenticated user could get access to information of some backend screens by invoking setSessionLocale in Apache OFBiz 16.11.01 to 16.11.06 | [
"cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
GHSA-2wr5-jh9c-7ffx | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
| null | null | null | null |
|
CVE-2005-4459 | Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands. | [
"cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2014-3612 | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames. | [
"cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2006-2075 | Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka "Query-of-death," as demonstrated by the OUSPG PROTOS DNS test suite. | [
"cpe:2.3:a:don_moore:mydns:1.1.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2021-42069 | When a user opens manipulated Tagged Image File Format (.tif) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
]
| null | 3.3 | null | 4.3 |
|
CVE-2024-48150 | D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function. | [
"cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-2x9c-w7rx-h8qj | Unspecified vulnerability in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via vectors related to obtaining "administrative access to the RPC interface." | []
| null | null | null | null |
|
GHSA-35m9-hm95-j6w7 | The Visual Form Builder WordPress plugin before 3.0.8 does not enforce nonce checks which could allow attackers to make a logged in admin or editor delete and restore arbitrary form entries via CSRF attacks | []
| null | 8.1 | null | null |
|
ICSA-23-234-03 | Rockwell Automation ThinManager ThinServer | Due to improper input validation, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message. Due to improper input validation, a path traversal vulnerability exists when the ThinManager processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message. Due to improper input validation, a path traversal vulnerability exists, via the file name field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message. | []
| null | null | 9.8 | null |
CVE-2021-40028 | The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-v36x-x4cv-7vr2 | Kernel pointers are printed in the log file prior to SMR May-2023 Release 1 allows a privileged local attacker to bypass ASLR. | []
| null | 4.4 | null | null |
|
GHSA-69w5-4pcx-9vjr | Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | []
| null | 6.5 | null | null |
|
GHSA-fxf2-f3qj-46v8 | Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010. | []
| null | 5.3 | null | null |
|
CVE-2007-4134 | Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive. | [
"cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2016-6760 | An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29617572. References: QC-CR#1055783. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-4xhw-j298-f2jr | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qode Interactive Qi Blocks allows Stored XSS.This issue affects Qi Blocks: from n/a through 1.3. | []
| null | 6.5 | null | null |
|
CVE-2020-10817 | The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued. | [
"cpe:2.3:a:custom_searchable_data_entry_system_project:custom_searchable_data_entry_system:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | 6.5 |
|
CVE-2021-28196 | ASUS BMC's firmware: buffer overflow - Generate SSL certificate function | The specific function in ASUS BMC’s firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. | [
"cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
CVE-2013-2409 | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality via vectors related to PIA Core Technology. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-cpj3-fmx3-44jh | Buffer overflow in Michael Lamont Savant Web Server 3.0 allows remote attackers to cause a denial of service (crash) via a long HTTP request to the cgi-bin directory in which the CGI program name contains a large number of . (dot) characters. | []
| null | null | null | null |
|
RHSA-2022:7001 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
]
| null | 3.7 | null | null |
RHSA-2023:5255 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: save/restore speculative MSRs during S3 suspend/resume Kernel: bluetooth: Unauthorized management command execution kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() hw: amd: Cross-Process Information Leak kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
]
| null | 7.8 | null | null |
GHSA-2vg7-q8hg-5f79 | A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution | []
| null | null | null | null |
|
GHSA-pjp4-f857-pw2v | An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point. | []
| null | 5.3 | null | null |
|
CVE-2013-4449 | The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-hj3f-6gcp-jg8j | Open redirect in Tornado | Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL. | []
| 5.3 | 6.1 | null | null |
ICSA-21-313-05 | OSIsoft PI Vision | A remote attacker with write access to PI Vision could inject code into a display. Unauthorized information disclosure, modification, or deletion is possible if a victim views or interacts with the infected display using Microsoft Internet Explorer. The impact affects PI System data and other data accessible with victim 's user permissions.CVE-2021-43551has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N). PI Vision could disclose information to a user with insufficient privileges for an AF attribute that is the child of another attribute and is configured as a Limits property.CVE-2021-43553has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | 3.1 | null |
CVE-2019-8325 | An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) | [
"cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2024-37085 | VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. | [
"cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*"
]
| null | 6.8 | null | null |
|
GHSA-7rr4-25h7-4mj3 | OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. | []
| null | null | null | null |
|
CVE-2009-4742 | Multiple SQL injection vulnerabilities in Docebo 3.6.0.3 allow remote attackers to execute arbitrary SQL commands via (1) the word parameter in a play help action to the faq module, reachable through index.php; (2) the word parameter in a play keyw action to the link module, reachable through index.php; (3) the id_certificate parameter in an elemmetacertificate action to the meta_certificate module, reachable through index.php; or (4) the id_certificate parameter in an elemcertificate action to the certificate module, reachable through index.php. | [
"cpe:2.3:a:docebo:docebo:3.6.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2025-50260 | Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetFirewallCfg function via the firewallEn parameter. | []
| null | 7.5 | null | null |
|
GHSA-j4j6-xqv7-cqrg | Cross-Site Request Forgery (CSRF) vulnerability in Manish Kumar Agarwal Change Table Prefix.This issue affects Change Table Prefix: from n/a through 2.0. | []
| null | 4.3 | null | null |
|
CVE-2022-22423 | IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7.x MTM for 4769) could allow a local user to cause a denial of service due to improper input validation. IBM X-Force ID: 223596. | [
"cpe:2.3:a:ibm:common_cryptographic_architecture:*:*:*:*:mtm_for_4767:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:common_cryptographic_architecture:*:*:*:*:mtm_for_4769:*:*:*",
"cpe:2.3:o:ibm:powerlinux:-:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
CVE-2007-4966 | SQL injection vulnerability in www/people/editprofile.php in GForge 4.6b2 and earlier allows remote attackers to execute arbitrary SQL commands via the skill_delete[] parameter. | [
"cpe:2.3:a:gforge:gforge:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-hhh4-2vgc-rxh8 | TUTOS 1.1 allows remote attackers to execute arbitrary code by uploading the code using file_new.php, then directly accessing the uploaded code via a request to the repository containing the code. | []
| null | null | null | null |
|
GHSA-87f4-vh8g-rm8g | SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::Reader::getWord(). | []
| null | 5.5 | null | null |
|
GHSA-j7gh-h9wh-xr7m | An elevation of privilege vulnerability in the Qualcomm video driver. Product: Android. Versions: Android kernel. Android ID: A-34386696. References: QC-CR#1024872. | []
| null | null | 7.8 | null |
|
GHSA-c5rh-2mpx-r3x4 | The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins. | []
| null | 5.4 | null | null |
|
GHSA-6qpr-j96r-rh4v | IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash. | []
| null | 7.5 | null | null |
|
CVE-2015-7256 | ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. | [
"cpe:2.3:o:zyxel:nwa1100-n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1100-n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1100-nh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1100-nh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1121-ni_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1121-ni:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1123-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1123-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nwa1123-ni_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nwa1123-ni:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:p-660hn-51_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:p-663hn-51_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg1312-b30a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg1312-b30a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg1312-b30b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg1312-b30b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8924-b30a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8924-b30a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vsg1435-b101_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vsg1435-b101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5318-b20a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5318-b20a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:sbg3500-n000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1900-8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1900-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:c1000z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:c1000z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:q1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:q1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:fr1000z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:fr1000z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:p8702n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:p8702n:-:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 |
|
RHSA-2024:3254 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps buildah: full container escape at build time golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 4.3 | null | null |
GHSA-fwv5-6pxv-2xm7 | A cross-site scripting vulnerability in Skyhigh SWG in main releases 11.x prior to 11.2.6, 10.x prior to 10.2.17, and controlled release 12.x prior to 12.0.1 allows a remote attacker to craft SWG-specific internal requests with URL paths to any third-party website, causing arbitrary content to be injected into the response when accessed through SWG. | []
| null | 6.1 | null | null |
|
GHSA-vp46-rrwg-r2fv | SmartWin CyberOffice Shopping Cart 2 (aka CyberShop) allows remote attackers to modify price information by changing the "Price" hidden form variable. | []
| null | null | null | null |
|
GHSA-w8fh-vpcc-95h6 | This candidate was in a CNA pool that was not assigned to any issues during 2022. | []
| null | null | null | null |
|
CVE-2019-5517 | VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. | [
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*"
]
| null | null | 6.8 | 5.8 |
|
RHSA-2016:2696 | Red Hat Security Advisory: atomic-openshift security and bug fix update | 3: Router sometimes selects new routes over old routes when determining claimed hostnames | [
"cpe:/a:redhat:openshift:3.3::el7"
]
| null | null | 6.3 | null |
CVE-2022-43350 | Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_inquiry. | [
"cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
CVE-2025-47577 | WordPress TI WooCommerce Wishlist < 2.10.0 - Arbitrary File Upload Vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in TemplateInvaders TI WooCommerce Wishlist allows Upload a Web Shell to a Web Server.This issue affects TI WooCommerce Wishlist: from n/a before 2.10.0. | []
| null | 10 | null | null |
GHSA-hc6f-9mg3-q7h3 | Unspecified vulnerability in Peanut Knowledge Base (PeanutKB) 0.0.3 and earlier has unknown impact and attack vectors. | []
| null | null | null | null |
|
CVE-2013-1128 | Multiple cross-site request forgery (CSRF) vulnerabilities in the server in Cisco Unified MeetingPlace before 7.1(2.2000) allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, aka Bug ID CSCuc64903. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:cisco:unified_meetingplace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:7.0.2:mr1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:7.0.3:mr2:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-p56w-mgwq-3w3q | A vulnerability, which was classified as problematic, was found in SourceCodester User Registration and Login System 1.0. Affected is an unknown function of the file /endpoint/delete-user.php. The manipulation of the argument user leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246612. | []
| null | 3.5 | null | null |
|
GHSA-26hr-4x6c-5c7x | The CM Popup Plugin for WordPress WordPress plugin before 1.6.6 does not sanitise and escape some of the campaign settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks | []
| null | 4.8 | null | null |
|
GHSA-jcjp-qqpq-pc54 | Zope allows local users to read arbitrary files | Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files. | []
| null | null | null | null |
GHSA-282f-787m-2r6r | Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Visual Analyzer). Supported versions that are affected are 5.9.0.0.0 and 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | []
| null | 5.4 | null | null |
|
CVE-2024-21978 | Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption. | [
"cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*"
]
| null | 6 | null | null |
|
RHSA-2021:1879 | Red Hat Security Advisory: python38:3.8 security update | python: CRLF injection via HTTP request method in httplib/http.client python-lxml: mXSS due to the use of improper parser python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.9 | null | null |
RHSA-2022:2120 | Red Hat Security Advisory: zsh security update | zsh: Prompt expansion vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.8 | null | null |
GHSA-v9j4-cp63-qv62 | Tarslip in go-unarr | unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive. | []
| null | 9.8 | null | null |
GHSA-38jf-hjrq-x3rc | modules/Users/ForgotPassword.php in vTiger 6.0 before Security Patch 2 allows remote attackers to reset the password for arbitrary users via a request containing the username, password, and confirmPassword parameters. | []
| null | null | null | null |
|
GHSA-h27r-xjf3-47jx | A heap-based buffer over-read was discovered in decompileJUMP function in util/decompile.c of libming v0.4.8. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by swftocxx. | []
| null | null | 6.5 | null |
|
CVE-2006-6152 | Multiple SQL injection vulnerabilities in vSpin.net Classified System 2004 allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to (a) cat.asp, or the (2) keyword, (3) order, (4) sort, (5) menuSelect, or (6) state parameter to (b) search.asp. | [
"cpe:2.3:a:vspin.net:classified_system:2004:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2012-3113 | Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0.20 allows remote authenticated users to affect confidentiality and integrity, related to EPERF. | [
"cpe:2.3:a:oracle:peoplesoft_products:9.0.20:*:*:*:*:*:*:*"
]
| null | null | null | 5.5 |
|
CVE-2013-3945 | The MrSID plugin (MrSID.dll) before 4.37 for IrfanView allows remote attackers to execute arbitrary code via a nband tag. | [
"cpe:2.3:a:extensis:mrsid:*:*:*:*:*:irfanview:*:*"
]
| null | 7.8 | null | 6.8 |
|
GHSA-6fqq-6hm4-chwp | Cisco WebEx Meeting Center does not properly restrict the content of URLs, which allows remote attackers to obtain sensitive information via vectors related to file: URIs, aka Bug ID CSCus18281. | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.