id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9p74-pqx9-3mrw
Vulnerability in the Oracle Argus Safety product of Oracle Health Sciences Applications (component: Letters). The supported version that is affected is 8.2.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety. While the vulnerability is in Oracle Argus Safety, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Argus Safety accessible data. CVSS 3.1 Base Score 5.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
[]
null
null
null
null
CVE-2017-14618
Cross-site scripting (XSS) vulnerability in inc/PMF/Faq.php in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the Questions field in an "Add New FAQ" action.
[ "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
CVE-2019-14664
In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks.
[ "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2004-0004
The libCheckSignature function in crypto-utils.lib for OpenCA 0.9.1.6 and earlier only compares the serial of the signer's certificate and the one in the database, which can cause OpenCA to incorrectly accept a signature if the certificate's chain is trusted by OpenCA's chain directory, allowing remote attackers to spoof requests from other users.
[ "cpe:2.3:a:openca:openca:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2012-4002
Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2012-0678
Cross-site scripting (XSS) vulnerability in Apple Safari before 6.0 allows remote attackers to inject arbitrary web script or HTML via a feed:// URL.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2023-23929
Refresh tokens do not expire in Vantage6
vantage6 is a privacy preserving federated learning infrastructure for secure insight exchange. Currently, the refresh token is valid indefinitely. The refresh token should get a validity of 24-48 hours. A fix was released in version 3.8.0.
[ "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2008-6424
Directory traversal vulnerability in FFFTP 1.96b allows remote FTP servers to create or overwrite arbitrary files via a response to an FTP LIST command with a filename that contains a .. (dot dot).
[ "cpe:2.3:a:jun_sota:ffftp:1.96b:*:*:*:*:*:*:*" ]
null
null
null
8.8
GHSA-x3f8-9pw6-9v28
Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.10CU2 have unknown impact and attack vectors related to (1) Application Object Library (APPS01), (2) Human Resources (APPS03), (3) Payables (APPS04), (4) Trading Community Architecture (APPS05), and (5) Web Applications Desktop Integrator (APPS06).
[]
null
null
null
null
CVE-2022-24937
Malformed Zigbee packet causes Assert in EmberZNet 7.0.0 or earlier
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Silicon Labs Ember ZNet allows Overflow Buffers.
[ "cpe:2.3:a:silabs:emberznet:1.0.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2018-9923
An issue was discovered in idreamsoft iCMS through 7.0.7. CSRF exists in admincp.php, as demonstrated by adding an article via an app=article&do=save&frame=iPHP request.
[ "cpe:2.3:a:icmsdev:icms:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
RHSA-2018:0583
Red Hat Security Advisory: rh-ruby22-ruby security, bug fix, and enhancement update
ruby: DL:: dlopen could open a library with tainted library name ruby: DL:: dlopen could open a library with tainted library name ruby: Buffer underrun vulnerability in Kernel.sprintf rubygems: Escape sequence in the "summary" field of gemspec rubygems: No size limit in summary length of gem spec rubygems: Arbitrary file overwrite due to incorrect validation of specification name rubygems: DNS hijacking vulnerability rubygems: Unsafe object deserialization through YAML formatted gem specifications ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick ruby: Buffer underrun in OpenSSL ASN1 decode ruby: Arbitrary heap exposure during a JSON.generate call ruby: Command injection vulnerability in Net::FTP ruby: Command injection in lib/resolv.rb:lazy_initialize() allows arbitrary code execution
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
CVE-2018-10423
mc-admin/post.php in MiniCMS 1.10 allows remote attackers to obtain a directory listing of the top-level directory of the web root via a link that becomes available after posting an article.
[ "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*" ]
null
null
2.7
4
GHSA-j7pv-hcg7-83ch
Menasoft SPHERE server 0.99x and 0.5x allows remote attackers to cause a denial of service by establishing a large number of connections to the server without providing login credentials, which prevents other users from being able to log in.
[]
null
null
null
null
GHSA-fjhx-vwcj-hrw9
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 12.1.0.4 and 12.1.0.5 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Loader Service.
[]
null
null
null
null
GHSA-xv68-rrmw-9xwf
Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)
ImpactWith access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user's current session.PatchesUpgrade to 4.4.13 or 5.1.1 or later.WorkaroundsNoneReferenceshttps://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_ScriptingIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
5.1
4.8
null
null
CVE-2020-7804
ActiveX Control(HShell.dll) in Handy Groupware 1.7.3.1 for Windows 7, 8, and 10 allows an attacker to execute arbitrary command via the ShellExec method.
[ "cpe:2.3:a:handysoft:groupware:1.7.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*" ]
null
6.4
null
null
CVE-2023-49128
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process.
[ "cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0001:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0002:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0003:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0004:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0005:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0006:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0007:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0008:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0009:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-mgm3-5x33-7mw3
Cross-site scripting (XSS) vulnerability in modifier.php in EditeurScripts EsNews 1.2 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.
[]
null
null
null
null
CVE-2023-52346
In modem driver, there is a possible system crash due to improper input validation. This could lead to local information disclosure with System execution privileges needed
[]
null
4.4
null
null
GHSA-6pw7-57q6-83j4
DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `commandTable.`
[]
null
8
null
null
CVE-2005-2793
PHP remote file inclusion vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to execute arbitrary PHP code via the custom_welcome_page parameter.
[ "cpe:2.3:a:phpldapadmin_project:phpldapadmin:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpldapadmin_project:phpldapadmin:0.9.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2010-2269
Directory traversal vulnerability in loadstatic.cgi in Accoria Web Server (aka Rock Web Server) 1.4.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter.
[ "cpe:2.3:a:accoria:rock_web_server:1.4.7:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2025-28866
WordPress Login Logger plugin <= 1.2.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in smerriman Login Logger allows Cross Site Request Forgery. This issue affects Login Logger: from n/a through 1.2.1.
[]
null
4.3
null
null
RHSA-2020:2893
Red Hat Security Advisory: bind security update
bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.5
null
null
GHSA-gg7x-7c85-2fh7
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
[]
null
null
null
null
CVE-2015-5635
The Newphoria Koritore application before 1.1 for Android and before 1.1 for iOS allows attackers to bypass a URL whitelist protection mechanism and obtain API access via unspecified vectors.
[ "cpe:2.3:a:newphoria_corporation:koritore:*:*:*:*:*:android:*:*", "cpe:2.3:a:newphoria_corporation:koritore:*:*:*:*:*:ios:*:*" ]
null
null
null
6.8
GHSA-9xw8-39cq-r6j4
The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.
[]
null
5.5
null
null
CVE-2022-45141
Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96).
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2004-2532
Serv-U FTP server before 5.1.0.0 has a default account and password for local administration, which allows local users to execute arbitrary commands by connecting to the server using the default administrator account, creating a new user, logging in as that new user, and then using the SITE EXEC command.
[ "cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.9:*:*:*:*:*:*:*" ]
null
null
null
10
cisco-sa-finesse-proxy-dos-vY5dQhrV
Cisco Finesse Reverse Proxy VPN-less Access to Finesse Desktop Denial of Service Vulnerability
A vulnerability in the nginx configurations that are provided as part of the VPN-less reverse proxy for Cisco Finesse could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for new and existing users who are connected through a load balancer. This vulnerability is due to improper IP address filtering by the reverse proxy. An attacker could exploit this vulnerability by sending a series of unauthenticated requests to the reverse proxy. A successful exploit could allow the attacker to cause all current traffic and subsequent requests to the reverse proxy through a load balancer to be dropped, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
[]
null
5.3
null
null
CVE-2023-41745
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
[ "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-mw66-fjc2-5mm7
An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php).
[]
null
null
null
null
CVE-2021-1594
Cisco Identity Services Engine Privilege Escalation Vulnerability
A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes.
[ "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.4\\(0.902\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6\\(0.156\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7\\(0.903\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0\\(0.458\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1\\(0.440\\):*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2019-12426
an unauthenticated user could get access to information of some backend screens by invoking setSessionLocale in Apache OFBiz 16.11.01 to 16.11.06
[ "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
GHSA-2wr5-jh9c-7ffx
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
null
null
CVE-2005-4459
Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands.
[ "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:gsx_server:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2014-3612
The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames.
[ "cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2006-2075
Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka "Query-of-death," as demonstrated by the OUSPG PROTOS DNS test suite.
[ "cpe:2.3:a:don_moore:mydns:1.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-42069
When a user opens manipulated Tagged Image File Format (.tif) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
3.3
null
4.3
CVE-2024-48150
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function.
[ "cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-2x9c-w7rx-h8qj
Unspecified vulnerability in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via vectors related to obtaining "administrative access to the RPC interface."
[]
null
null
null
null
GHSA-35m9-hm95-j6w7
The Visual Form Builder WordPress plugin before 3.0.8 does not enforce nonce checks which could allow attackers to make a logged in admin or editor delete and restore arbitrary form entries via CSRF attacks
[]
null
8.1
null
null
ICSA-23-234-03
Rockwell Automation ThinManager ThinServer
Due to improper input validation, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message. Due to improper input validation, a path traversal vulnerability exists when the ThinManager processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message. Due to improper input validation, a path traversal vulnerability exists, via the file name field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message.
[]
null
null
9.8
null
CVE-2021-40028
The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-v36x-x4cv-7vr2
Kernel pointers are printed in the log file prior to SMR May-2023 Release 1 allows a privileged local attacker to bypass ASLR.
[]
null
4.4
null
null
GHSA-69w5-4pcx-9vjr
Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
[]
null
6.5
null
null
GHSA-fxf2-f3qj-46v8
Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.
[]
null
5.3
null
null
CVE-2007-4134
Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
[ "cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2016-6760
An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29617572. References: QC-CR#1055783.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-4xhw-j298-f2jr
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qode Interactive Qi Blocks allows Stored XSS.This issue affects Qi Blocks: from n/a through 1.3.
[]
null
6.5
null
null
CVE-2020-10817
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
[ "cpe:2.3:a:custom_searchable_data_entry_system_project:custom_searchable_data_entry_system:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
6.5
CVE-2021-28196
ASUS BMC's firmware: buffer overflow - Generate SSL certificate function
The specific function in ASUS BMC’s firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
[ "cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*", "cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*", "cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*", "cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*", "cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*", "cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
CVE-2013-2409
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality via vectors related to PIA Core Technology.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-cpj3-fmx3-44jh
Buffer overflow in Michael Lamont Savant Web Server 3.0 allows remote attackers to cause a denial of service (crash) via a long HTTP request to the cgi-bin directory in which the CGI program name contains a large number of . (dot) characters.
[]
null
null
null
null
RHSA-2022:7001
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
3.7
null
null
RHSA-2023:5255
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: save/restore speculative MSRs during S3 suspend/resume Kernel: bluetooth: Unauthorized management command execution kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() hw: amd: Cross-Process Information Leak kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
GHSA-2vg7-q8hg-5f79
A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution
[]
null
null
null
null
GHSA-pjp4-f857-pw2v
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
[]
null
5.3
null
null
CVE-2013-4449
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.30:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.31:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.32:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.33:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.34:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.4.35:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-hj3f-6gcp-jg8j
Open redirect in Tornado
Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
[]
5.3
6.1
null
null
ICSA-21-313-05
OSIsoft PI Vision
A remote attacker with write access to PI Vision could inject code into a display. Unauthorized information disclosure, modification, or deletion is possible if a victim views or interacts with the infected display using Microsoft Internet Explorer. The impact affects PI System data and other data accessible with victim 's user permissions.CVE-2021-43551has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N). PI Vision could disclose information to a user with insufficient privileges for an AF attribute that is the child of another attribute and is configured as a Limits property.CVE-2021-43553has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
3.1
null
CVE-2019-8325
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
[ "cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2024-37085
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
[ "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-7rr4-25h7-4mj3
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
[]
null
null
null
null
CVE-2009-4742
Multiple SQL injection vulnerabilities in Docebo 3.6.0.3 allow remote attackers to execute arbitrary SQL commands via (1) the word parameter in a play help action to the faq module, reachable through index.php; (2) the word parameter in a play keyw action to the link module, reachable through index.php; (3) the id_certificate parameter in an elemmetacertificate action to the meta_certificate module, reachable through index.php; or (4) the id_certificate parameter in an elemcertificate action to the certificate module, reachable through index.php.
[ "cpe:2.3:a:docebo:docebo:3.6.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-50260
Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetFirewallCfg function via the firewallEn parameter.
[]
null
7.5
null
null
GHSA-j4j6-xqv7-cqrg
Cross-Site Request Forgery (CSRF) vulnerability in Manish Kumar Agarwal Change Table Prefix.This issue affects Change Table Prefix: from n/a through 2.0.
[]
null
4.3
null
null
CVE-2022-22423
IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7.x MTM for 4769) could allow a local user to cause a denial of service due to improper input validation. IBM X-Force ID: 223596.
[ "cpe:2.3:a:ibm:common_cryptographic_architecture:*:*:*:*:mtm_for_4767:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:common_cryptographic_architecture:*:*:*:*:mtm_for_4769:*:*:*", "cpe:2.3:o:ibm:powerlinux:-:*:*:*:*:*:*:*" ]
null
null
6.5
null
CVE-2007-4966
SQL injection vulnerability in www/people/editprofile.php in GForge 4.6b2 and earlier allows remote attackers to execute arbitrary SQL commands via the skill_delete[] parameter.
[ "cpe:2.3:a:gforge:gforge:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-hhh4-2vgc-rxh8
TUTOS 1.1 allows remote attackers to execute arbitrary code by uploading the code using file_new.php, then directly accessing the uploaded code via a request to the repository containing the code.
[]
null
null
null
null
GHSA-87f4-vh8g-rm8g
SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::Reader::getWord().
[]
null
5.5
null
null
GHSA-j7gh-h9wh-xr7m
An elevation of privilege vulnerability in the Qualcomm video driver. Product: Android. Versions: Android kernel. Android ID: A-34386696. References: QC-CR#1024872.
[]
null
null
7.8
null
GHSA-c5rh-2mpx-r3x4
The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
[]
null
5.4
null
null
GHSA-6qpr-j96r-rh4v
IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.
[]
null
7.5
null
null
CVE-2015-7256
ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.
[ "cpe:2.3:o:zyxel:nwa1100-n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1100-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1100-nh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1100-nh:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1121-ni_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1121-ni:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1123-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1123-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:nwa1123-ni_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:nwa1123-ni:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:p-660hn-51_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:p-663hn-51_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg1312-b30a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg1312-b30a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg1312-b30b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg1312-b30b:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vmg8924-b30a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vmg8924-b30a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vsg1435-b101_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vsg1435-b101:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:pmg5318-b20a:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:sbg3500-n000:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:c1000z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:c1000z:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:q1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:q1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:fr1000z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:fr1000z:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:p8702n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:p8702n:-:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
RHSA-2024:3254
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps buildah: full container escape at build time golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.3
null
null
GHSA-fwv5-6pxv-2xm7
A cross-site scripting vulnerability in Skyhigh SWG in main releases 11.x prior to 11.2.6, 10.x prior to 10.2.17, and controlled release 12.x prior to 12.0.1 allows a remote attacker to craft SWG-specific internal requests with URL paths to any third-party website, causing arbitrary content to be injected into the response when accessed through SWG.
[]
null
6.1
null
null
GHSA-vp46-rrwg-r2fv
SmartWin CyberOffice Shopping Cart 2 (aka CyberShop) allows remote attackers to modify price information by changing the "Price" hidden form variable.
[]
null
null
null
null
GHSA-w8fh-vpcc-95h6
This candidate was in a CNA pool that was not assigned to any issues during 2022.
[]
null
null
null
null
CVE-2019-5517
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
[ "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*" ]
null
null
6.8
5.8
RHSA-2016:2696
Red Hat Security Advisory: atomic-openshift security and bug fix update
3: Router sometimes selects new routes over old routes when determining claimed hostnames
[ "cpe:/a:redhat:openshift:3.3::el7" ]
null
null
6.3
null
CVE-2022-43350
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_inquiry.
[ "cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2025-47577
WordPress TI WooCommerce Wishlist < 2.10.0 - Arbitrary File Upload Vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in TemplateInvaders TI WooCommerce Wishlist allows Upload a Web Shell to a Web Server.This issue affects TI WooCommerce Wishlist: from n/a before 2.10.0.
[]
null
10
null
null
GHSA-hc6f-9mg3-q7h3
Unspecified vulnerability in Peanut Knowledge Base (PeanutKB) 0.0.3 and earlier has unknown impact and attack vectors.
[]
null
null
null
null
CVE-2013-1128
Multiple cross-site request forgery (CSRF) vulnerabilities in the server in Cisco Unified MeetingPlace before 7.1(2.2000) allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, aka Bug ID CSCuc64903. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:cisco:unified_meetingplace:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:7.0.2:mr1:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_meetingplace:7.0.3:mr2:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-p56w-mgwq-3w3q
A vulnerability, which was classified as problematic, was found in SourceCodester User Registration and Login System 1.0. Affected is an unknown function of the file /endpoint/delete-user.php. The manipulation of the argument user leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246612.
[]
null
3.5
null
null
GHSA-26hr-4x6c-5c7x
The CM Popup Plugin for WordPress WordPress plugin before 1.6.6 does not sanitise and escape some of the campaign settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks
[]
null
4.8
null
null
GHSA-jcjp-qqpq-pc54
Zope allows local users to read arbitrary files
Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files.
[]
null
null
null
null
GHSA-282f-787m-2r6r
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Visual Analyzer). Supported versions that are affected are 5.9.0.0.0 and 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
null
5.4
null
null
CVE-2024-21978
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
[ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*" ]
null
6
null
null
RHSA-2021:1879
Red Hat Security Advisory: python38:3.8 security update
python: CRLF injection via HTTP request method in httplib/http.client python-lxml: mXSS due to the use of improper parser python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2022:2120
Red Hat Security Advisory: zsh security update
zsh: Prompt expansion vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
GHSA-v9j4-cp63-qv62
Tarslip in go-unarr
unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.
[]
null
9.8
null
null
GHSA-38jf-hjrq-x3rc
modules/Users/ForgotPassword.php in vTiger 6.0 before Security Patch 2 allows remote attackers to reset the password for arbitrary users via a request containing the username, password, and confirmPassword parameters.
[]
null
null
null
null
GHSA-h27r-xjf3-47jx
A heap-based buffer over-read was discovered in decompileJUMP function in util/decompile.c of libming v0.4.8. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by swftocxx.
[]
null
null
6.5
null
CVE-2006-6152
Multiple SQL injection vulnerabilities in vSpin.net Classified System 2004 allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to (a) cat.asp, or the (2) keyword, (3) order, (4) sort, (5) menuSelect, or (6) state parameter to (b) search.asp.
[ "cpe:2.3:a:vspin.net:classified_system:2004:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2012-3113
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0.20 allows remote authenticated users to affect confidentiality and integrity, related to EPERF.
[ "cpe:2.3:a:oracle:peoplesoft_products:9.0.20:*:*:*:*:*:*:*" ]
null
null
null
5.5
CVE-2013-3945
The MrSID plugin (MrSID.dll) before 4.37 for IrfanView allows remote attackers to execute arbitrary code via a nband tag.
[ "cpe:2.3:a:extensis:mrsid:*:*:*:*:*:irfanview:*:*" ]
null
7.8
null
6.8
GHSA-6fqq-6hm4-chwp
Cisco WebEx Meeting Center does not properly restrict the content of URLs, which allows remote attackers to obtain sensitive information via vectors related to file: URIs, aka Bug ID CSCus18281.
[]
null
null
null
null