id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-1999-0758 | Netscape Enterprise 3.5.1 and FastTrack 3.01 servers allow a remote attacker to view source code to scripts by appending a %20 to the script's URL. | [
"cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:fasttrack_server:3.01:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2013-6204 | The Web Console in HP Application Information Optimizer (formerly HP Database Archiving) 6.2, 6.3, 6.4, 7.0, and 7.1 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, aka ZDI-CAN-2004. | [
"cpe:2.3:a:hp:application_information_optimizer:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:application_information_optimizer:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:application_information_optimizer:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:application_information_optimizer:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:application_information_optimizer:7.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-42321 | net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE | In the Linux kernel, the following vulnerability has been resolved:
net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE
The following splat is easy to reproduce upstream as well as in -stable
kernels. Florian Westphal provided the following commit:
d1dab4f71d37 ("net: add and use __skb_get_hash_symmetric_net")
but this complementary fix has been also suggested by Willem de Bruijn
and it can be easily backported to -stable kernel which consists in
using DEBUG_NET_WARN_ON_ONCE instead to silence the following splat
given __skb_get_hash() is used by the nftables tracing infrastructure to
to identify packets in traces.
[69133.561393] ------------[ cut here ]------------
[69133.561404] WARNING: CPU: 0 PID: 43576 at net/core/flow_dissector.c:1104 __skb_flow_dissect+0x134f/
[...]
[69133.561944] CPU: 0 PID: 43576 Comm: socat Not tainted 6.10.0-rc7+ #379
[69133.561959] RIP: 0010:__skb_flow_dissect+0x134f/0x2ad0
[69133.561970] Code: 83 f9 04 0f 84 b3 00 00 00 45 85 c9 0f 84 aa 00 00 00 41 83 f9 02 0f 84 81 fc ff
ff 44 0f b7 b4 24 80 00 00 00 e9 8b f9 ff ff <0f> 0b e9 20 f3 ff ff 41 f6 c6 20 0f 84 e4 ef ff ff 48 8d 7b 12 e8
[69133.561979] RSP: 0018:ffffc90000006fc0 EFLAGS: 00010246
[69133.561988] RAX: 0000000000000000 RBX: ffffffff82f33e20 RCX: ffffffff81ab7e19
[69133.561994] RDX: dffffc0000000000 RSI: ffffc90000007388 RDI: ffff888103a1b418
[69133.562001] RBP: ffffc90000007310 R08: 0000000000000000 R09: 0000000000000000
[69133.562007] R10: ffffc90000007388 R11: ffffffff810cface R12: ffff888103a1b400
[69133.562013] R13: 0000000000000000 R14: ffffffff82f33e2a R15: ffffffff82f33e28
[69133.562020] FS: 00007f40f7131740(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[69133.562027] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[69133.562033] CR2: 00007f40f7346ee0 CR3: 000000015d200001 CR4: 00000000001706f0
[69133.562040] Call Trace:
[69133.562044] <IRQ>
[69133.562049] ? __warn+0x9f/0x1a0
[ 1211.841384] ? __skb_flow_dissect+0x107e/0x2860
[...]
[ 1211.841496] ? bpf_flow_dissect+0x160/0x160
[ 1211.841753] __skb_get_hash+0x97/0x280
[ 1211.841765] ? __skb_get_hash_symmetric+0x230/0x230
[ 1211.841776] ? mod_find+0xbf/0xe0
[ 1211.841786] ? get_stack_info_noinstr+0x12/0xe0
[ 1211.841798] ? bpf_ksym_find+0x56/0xe0
[ 1211.841807] ? __rcu_read_unlock+0x2a/0x70
[ 1211.841819] nft_trace_init+0x1b9/0x1c0 [nf_tables]
[ 1211.841895] ? nft_trace_notify+0x830/0x830 [nf_tables]
[ 1211.841964] ? get_stack_info+0x2b/0x80
[ 1211.841975] ? nft_do_chain_arp+0x80/0x80 [nf_tables]
[ 1211.842044] nft_do_chain+0x79c/0x850 [nf_tables] | []
| null | null | null | null |
CVE-2023-37470 | Metabase vulnerable to remote code execution via POST /api/setup/validate API endpoint | Metabase is an open-source business intelligence and analytics platform. Prior to versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 1.43.7.3, 1.44.7.3, 1.45.4.3, and 1.46.6.4, a vulnerability could potentially allow remote code execution on one's Metabase server. The core issue is that one of the supported data warehouses (an embedded in-memory database H2), exposes a number of ways for a connection string to include code that is then executed by the process running the embedded database. Because Metabase allows users to connect to databases, this means that a user supplied string can be used to inject executable code. Metabase allows users to validate their connection string before adding a database (including on setup), and this validation API was the primary vector used as it can be called without validation. Versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 1.43.7.3, 1.44.7.3, 1.45.4.3, and 1.46.6.4 fix this issue by removing the ability of users to add H2 databases entirely. As a workaround, it is possible to block these vulnerabilities at the network level by blocking the endpoints `POST /api/database`, `PUT /api/database/:id`, and `POST /api/setup/validateuntil`. Those who use H2 as a file-based database should migrate to SQLite. | [
"cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*",
"cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*"
]
| null | 10 | null | null |
CVE-2024-7568 | Favicon Generator <= 1.5 - Cross-Site Request Forgery to Arbitrary File Deletion | The Favicon Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the output_sub_admin_page_0 function. This makes it possible for unauthenticated attackers to delete arbitrary files on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The plugin author deleted the functionality of the plugin to patch this issue and close the plugin, we recommend seeking an alternative to this plugin. | [
"cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:*"
]
| null | 9.6 | null | null |
CVE-2017-11299 | An issue was discovered in Adobe Digital Editions 4.5.6 and earlier versions. An exploitable memory corruption vulnerability exists, which could lead to disclosure of memory addresses. | [
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
CVE-2025-20984 | Incorrect default permission in Samsung Cloud for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to access data in Samsung Cloud for Galaxy Watch. | []
| null | 6.8 | null | null |
|
CVE-2018-1793 | IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 using SAML ear is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148948. | [
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
|
ICSA-15-153-01 | Beckwith Electric TCP Initial Sequence Vulnerability | Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. | []
| null | null | null | null |
CVE-2023-52429 | dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2020-28477 | Prototype Pollution | This affects all versions of package immer. | [
"cpe:2.3:a:immer_project:immer:*:*:*:*:*:node.js:*:*"
]
| null | 7.5 | null | null |
CVE-2020-27766 | A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
GHSA-4c57-27g6-54wg | Memory corruption in video due to double free while parsing 3gp clip with invalid meta data atoms in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | []
| null | 9.8 | null | null |
|
CVE-2007-2202 | PHP remote file inclusion vulnerability in inc_ACVS/SOAP/Transport.php in Accueil et Conseil en Visites et Sejours Web Services (ACVSWS) PHP5 (ACVSWS_PHP5) 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the CheminInclude parameter. | [
"cpe:2.3:a:acvsws:acvsws_php5:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-xfg6-9h5g-pxpr | PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code inside the markdown descriptions while creating a product, report or finding. | []
| null | 4.8 | null | null |
|
CVE-2014-3284 | Cisco IOS XE on ASR1000 devices, when PPPoE termination is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed PPPoE packet, aka Bug ID CSCuo55180. | [
"cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*"
]
| null | null | null | 6.1 |
|
CVE-2020-19699 | Cross Site Scripting vulnerability found in KOHGYLW Kiftd v.1.0.18 allows a remote attacker to execute arbitrary code via the <ifram> tag in the upload file page. | [
"cpe:2.3:a:kiftd_project:kiftd:1.0.18:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
CVE-2024-9862 | Miniorange OTP Verification with Firebase <= 3.6.0 - Unauthenticated Arbitrary User Password Change | The Miniorange OTP Verification with Firebase plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 3.6.0. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources, and the user current password check is missing. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. | [
"cpe:2.3:a:miniorange:otp_verification:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-v89w-v9jm-g4f3 | A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.3.37598. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled. | []
| null | 7.8 | null | null |
|
CVE-2017-10363 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Security). Supported versions that are affected are 11.3, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data. Note: Contact Support for fixes. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*"
]
| null | null | 7.1 | 5.5 |
|
CVE-2024-51605 | WordPress Genoo plugin <= 6.0.10 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Genoo, LLC Genoo allows DOM-Based XSS.This issue affects Genoo: from n/a through 6.0.10. | [
"cpe:2.3:a:genoo:genoo:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
GHSA-843c-r5h3-9m54 | An information disclosure vulnerability exists when Unistore.dll fails to properly handle objects in memory, aka 'Microsoft unistore.dll Information Disclosure Vulnerability'. | []
| null | null | 5.5 | null |
|
GHSA-chxj-cccp-c8h2 | An untrusted search path vulnerability in the installer of PDFescape Desktop version 4.0.22 and earlier allows an attacker to gain privileges and execute code via DLL hijacking. | []
| null | null | null | null |
|
GHSA-3g55-69j2-vxv7 | Unvalidated input in the AdRotate WordPress plugin, versions before 5.8.4, leads to Authenticated SQL injection via param "id". This requires an admin privileged user. | []
| null | null | null | null |
|
CVE-2023-23021 | Cross Site Scripting (XSS) vulnerability in sourcecodester oretnom23 pos point sale system 1.0, allows attackers to execute arbitrary code via the code, name, and description inputs in file Main.php. | []
| null | 6.1 | null | null |
|
GHSA-q45p-9x4j-2gjf | An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via a crafted request to the Password Change mechanism. | []
| null | 8.2 | null | null |
|
RHSA-2020:0271 | Red Hat Security Advisory: libarchive security update | libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 8.1 | null | null |
GHSA-4j43-22vc-mh3h | The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string. | []
| null | null | 6.8 | null |
|
GHSA-6x3x-v7pj-7967 | The Traffic Grapher Server for NetMechanica NetDecision before 4.6.1 allows remote attackers to obtain the source code of NtDecision script files with a .nd extension via an invalid version number in an HTTP request, as demonstrated using default.nd. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
CVE-2023-47238 | WordPress Top 10 Plugin <= 3.3.2 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in WebberZone Top 10 – WordPress Popular posts by WebberZone plugin <= 3.3.2 versions. | [
"cpe:2.3:a:webberzone:top_10:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | null |
CVE-2017-5082 | Failure to take advantage of available mitigations in credit card autofill in Google Chrome prior to 59.0.3071.92 for Android allowed a local attacker to take screen shots of credit card information via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
GHSA-2r4r-h566-5q6r | Rit Research Labs The Bat! 1.51 for Windows allows a remote attacker to cause a denial of service by sending an email to a user's account containing a carriage return <CR> that is not followed by a line feed <LF>. | []
| null | null | null | null |
|
GHSA-r6hg-c625-jgf6 | Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-37963. | []
| null | 7.8 | null | null |
|
GHSA-xv49-2wgv-qvc2 | Cross-site scripting (XSS) vulnerability in index.php in the hosted_signup module in NetArt Media iBoutique.MALL 1.2 allows remote attackers to inject arbitrary web script or HTML via the tmpl parameter. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
CVE-2003-0908 | The Utility Manager in Microsoft Windows 2000 executes winhlp32.exe with system privileges, which allows local users to execute arbitrary code via a "Shatter" style attack using a Windows message that accesses the context sensitive help button in the GUI, as demonstrated using the File Open dialog in the Help window, a different vulnerability than CVE-2004-0213. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
GHSA-cp3h-7fmf-r466 | The Wild Women United (aka com.wildwomenunited) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
GHSA-hrw6-wg82-cm62 | Jupyter server on Windows discloses Windows user password hash | SummaryJupyter Server on Windows has a vulnerability that lets unauthenticated attackers leak the NTLMv2 password hash of the Windows user running the Jupyter server. An attacker can crack this password to gain access to the Windows machine hosting the Jupyter server, or access other network-accessible machines or 3rd party services using that credential. Or an attacker perform an NTLM relay attack without cracking the credential to gain access to other network-accessible machines. | []
| null | 7.5 | null | null |
GHSA-rvwg-6c86-cxf4 | /api/user/users in the web GUI for the Cubro EXA48200 network packet broker (build 20231025055018) fixed in V5.0R14.5P4-V3.3R1 allows remote authenticated users of the application to increase their privileges by sending a single HTTP PUT request with rolename=Administrator, aka incorrect access control. | []
| null | 5.4 | null | null |
|
GHSA-92jh-gwch-jq38 | PocketMine-MP server crash with certain invalid JSON payloads in `LoginPacket` due to dependency vulnerability (again) | ImpactAn attacker could crash PocketMine-MP by sending malformed JSON in `LoginPacket`.This happened due to the particular handling of NULL types in the json mapper which accepts NULL type values in typed arrays which PocketMine-MP did not expect.Code processing arrays in the JSON data could then crash due to unexpected `NULL` elements.PatchesThis problem was fixed in 5.3.1 and 4.23.1 by updating JsonMapper to include the following commit: pmmp/netresearch-jsonmapper@4f90e8dab1c9df331fad7d3d89823404e882668cAn upstream patch for this issue was proposed via https://github.com/cweiske/jsonmapper/pull/211; however, as of 2024-05-15, the patch has not been accepted upstream due to debate about how to deal with the behavior. For now, a fork of JsonMapper is used by PocketMine-MP to workaround the issue.WorkaroundsA plugin may handle `DataPacketReceiveEvent` for `LoginPacket` and check that none of the input arrays contain `NULL` where it's not expected, but this is rather cumbersome.ReferencesProposed upstream patch for a behavior change: https://github.com/cweiske/jsonmapper/pull/211 | []
| null | 7.5 | null | null |
CVE-2023-43103 | An XSS issue was discovered in a web endpoint in Zimbra Collaboration (ZCS) before 10.0.4 via an unsanitized parameter. This is also fixed in 8.8.15 Patch 43 and 9.0.0 Patch 36. | [
"cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-mjw4-93jr-mr95 | A vulnerability classified as problematic was found in Linux Kernel. Affected by this vulnerability is the function mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c of the component mvpp2. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211033 was assigned to this vulnerability. | []
| null | 3.5 | null | null |
|
CVE-2014-7056 | The Yeast Infection (aka com.wyeastinfectionapp) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:yeast_infection_project:yeast_infection:0.1:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
GHSA-4v95-m49f-6w63 | A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session. | []
| null | 8.7 | null | null |
|
GHSA-69f4-m2h4-c2wc | SQL injection vulnerability index.php in Dragoran Portal module 1.3 for Invision Power Board (IPB) allows remote attackers to execute arbitrary SQL commands via the site parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
GHSA-gfqv-2x4h-j842 | Microsoft Internet Explorer 5.0, 5.01, and 5.5 allows remote attackers to monitor the contents of the clipboard via the getData method of the clipboardData object. | []
| null | null | null | null |
|
CVE-2018-8312 | A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka "Microsoft Access Remote Code Execution Vulnerability." This affects Microsoft Access, Microsoft Office. | [
"cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
CVE-2024-6995 | Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-mv5m-45gv-gh97 | An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function. | []
| null | 7.5 | null | null |
|
CVE-2014-9101 | Multiple cross-site request forgery (CSRF) vulnerabilities in Oxwall 1.7.0 (build 7907 and 7906) and SkaDate Lite 2.0 (build 7651) allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks or possibly have other unspecified impact via the (1) label parameter to admin/users/roles/, (2) lang[1][base][questions_account_type_5615100a931845eca8da20cfdf7327e0] in an AddAccountType action or (3) qst_name parameter in an addQuestion action to admin/questions/ajax-responder/, or (4) form_name or (5) restrictedUsername parameter to admin/restricted-usernames. | [
"cpe:2.3:a:skalfa:skadate_lite:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oxwall:oxwall:1.7.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
RHSA-2022:1915 | Red Hat Security Advisory: httpd:2.4 security and bug fix update | httpd: Single zero byte stack overflow in mod_auth_digest httpd: Request splitting via HTTP/2 method injection and mod_proxy httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path httpd: possible NULL dereference or SSRF in forward proxy configurations | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.1 | null | null |
GHSA-5vj8-g3qg-4qh6 | X-Forwarded-For header allows brute-forcing autoblocked IP addresses | An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header. | []
| null | 9.8 | null | null |
CVE-1999-1095 | sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. | [
"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2023-52545 | Vulnerability of undefined permissions in the Calendar app.
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-3wc8-359c-gghm | Nyron 1.0 is affected by a SQL injection vulnerability through Nyron/Library/Catalog/winlibsrch.aspx. To exploit this vulnerability, an attacker must inject '"> on the thes1 parameter. | []
| null | 9.8 | null | null |
|
GHSA-37vp-vw2v-ww4q | Food Order Script 1.0 has SQL Injection via the /list city parameter. | []
| null | null | 9.8 | null |
|
GHSA-cxfw-jrj9-6wmg | A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system. | []
| null | 5.5 | null | null |
|
GHSA-m7pm-65hr-r8px | The wp-publications WordPress plugin through 1.2 does not escape filenames before outputting them back in the page, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
|
CVE-2022-28168 | In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords. | [
"cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-j3v2-5568-fr5f | FS Foodpanda Clone 1.0 has SQL Injection via the /food keywords parameter. | []
| null | 9.8 | null | null |
|
CVE-2025-28057 | owl-admin v3.2.2~ to v4.10.2 is vulnerable to SQL Injection in /admin-api/system/admin_menus/save_order. | []
| null | 7.2 | null | null |
|
CVE-2022-27114 | There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function. | [
"cpe:2.3:a:htmldoc_project:htmldoc:1.9.16:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
RHSA-2022:5738 | Red Hat Security Advisory: Django 3.2.14 Security Update | python-django: Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments | [
"cpe:/a:redhat:rhui:4::el8"
]
| null | 9.8 | null | null |
GHSA-x255-qvfv-83jw | A Broken Access Control vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, and 5.4.0 before 5.4.10 allows remote, authenticated, and unprivileged users to retrieve alerts, cases, logs, observables, or tasks, regardless of the user's permissions, through a specific API endpoint. | []
| 6.8 | null | null | null |
|
CVE-2013-4762 | Puppet Enterprise before 3.0.1 does not sufficiently invalidate a session when a user logs out, which might allow remote attackers to hijack sessions by obtaining an old session ID. | [
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
CVE-2015-8068 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2024-10671 | Button Block – Get fully customizable & multi-functional buttons <= 1.1.4 - Authenticated (Contributor+) Post Disclosure | The Button Block – Get fully customizable & multi-functional buttons plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.4 via the [btn_block] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. | []
| null | 4.3 | null | null |
CVE-2024-45882 | DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `delete_map_profile.` | [
"cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
|
CVE-2003-0885 | Xscreensaver 4.14 contains certain debugging code that should have been omitted, which causes Xscreensaver to create temporary files insecurely in the (1) apple2, (2) xanalogtv, and (3) pong screensavers, and allows local users to overwrite arbitrary files via a symlink attack. | [
"cpe:2.3:a:xscreensaver:xscreensaver:4.14:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2018-11375 | The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | [
"cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
CVE-2016-3064 | NetApp Clustered Data ONTAP before 8.2.4P4 and 8.3.x before 8.3.2P2 allows remote authenticated users to obtain sensitive cluster and tenant information via unspecified vectors. | [
"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:8.3.2:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
CVE-2009-1632 | Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c. | [
"cpe:2.3:a:ipsec-tools:ipsec-tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc4:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc5:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.7:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-xcx7-fqjh-qrm8 | MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action. | []
| null | null | 5.4 | null |
|
CVE-2017-5704 | Platform sample code firmware included with 4th Gen Intel Core Processor, 5th Gen Intel Core Processor, 6th Gen Intel Core Processor, and 7th Gen Intel Core Processor potentially exposes password information in memory to a local attacker with administrative privileges. | [
"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5820k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*"
]
| null | null | 6.7 | 2.1 |
|
CVE-2023-33368 | Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes. | [
"cpe:2.3:a:assaabloy:control_id_idsecure:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2024-29399 | An issue was discovered in GNU Savane v.3.13 and before, allows a remote attacker to execute arbitrary code and escalate privileges via a crafted file to the upload.php component. | []
| null | 7.6 | null | null |
|
CVE-2021-45760 | GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_list_last(). This vulnerability allows attackers to cause a Denial of Service (DoS). | [
"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-3pcr-6mwc-x3p8 | Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 1 of 6). | []
| null | null | 9.8 | null |
|
CVE-2007-1797 | Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667. | [
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-j9ww-72pm-37h3 | UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of privoxy on openSUSE Leap 15.1, Factory allows local attackers to escalate from user privoxy to root. This issue affects: openSUSE Leap 15.1 privoxy version 3.0.28-lp151.1.1 and prior versions. openSUSE Factory privoxy version 3.0.28-2.1 and prior versions. | []
| null | null | null | null |
|
CVE-2020-2094 | A missing permission check in Jenkins Health Advisor by CloudBees Plugin 3.0 and earlier allows attackers with Overall/Read permission to send a fixed email to an attacker-specific recipient. | [
"cpe:2.3:a:jenkins:health_advisor_by_cloudbees:*:*:*:*:*:jenkins:*:*"
]
| null | 4.3 | null | 4 |
|
RHSA-2021:1352 | Red Hat Security Advisory: thunderbird security update | Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 2.5 | 6.1 | null |
CVE-2010-1398 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly perform ordered list insertions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document, related to the insertion of an unspecified element into an editable container and the access of an uninitialized element. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-g4gm-pxh3-29fq | Unrestricted Uploads in Concrete5 | Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value. | []
| null | 5.3 | null | null |
GHSA-jrmh-qf4p-w726 | The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters. | []
| null | null | null | null |
|
CVE-2022-20604 | In SAECOMM_SetDcnIdForPlmn of SAECOMM_DbManagement.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure from a single device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-230463606References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-vm67-mh96-95mq | Malicious Package in bubfer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised. | []
| null | 9.8 | null | null |
CVE-2017-20182 | Mobile Vikings Django AJAX Utilities Backslash pagination.js Pagination cross site scripting | A vulnerability was found in Mobile Vikings Django AJAX Utilities up to 1.2.1 and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The patch is named 329eb1dd1580ca1f9d4f95bc69939833226515c9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611. | [
"cpe:2.3:a:mobilevikings:django_ajax_utilities:*:*:*:*:*:*:*:*"
]
| null | 3.5 | 3.5 | 4 |
GHSA-72vm-gmpv-57x3 | An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::WritePartial() located in Ap4ByteStream.cpp. It allows an attacker to cause code execution or information disclosure. | []
| null | null | null | null |
|
GHSA-whxq-h93c-wvrx | A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /protocol/iscdevicestatus/deleteonlineuser.php. The manipulation of the argument messagecontent leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257287. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 6.3 | null | null |
|
GHSA-gg4p-8wfq-mx57 | IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. | []
| null | 3.3 | null | null |
|
GHSA-px77-jg6r-fh7m | Cross-site scripting (XSS) vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php. | []
| null | null | null | null |
|
GHSA-c8p2-m7p2-6xhm | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
| null | 4.9 | null | null |
|
GHSA-92rh-3xpw-hjgg | NukeNabber allows remote attackers to cause a denial of service by connecting to the NukeNabber port (1080) without sending any data, which causes the CPU usage to rise to 100% from the report.exe program that is executed upon the connection. | []
| null | null | null | null |
|
GHSA-xmgh-fm48-p9j2 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Shoaib Rehmat ZIJ KART allows PHP Local File Inclusion.This issue affects ZIJ KART: from n/a through 1.1. | []
| null | 8.1 | null | null |
|
CVE-2023-24450 | Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | [
"cpe:2.3:a:jenkins:view-cloner:1.0:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:view-cloner:1.1:*:*:*:*:jenkins:*:*"
]
| null | 6.5 | null | null |
|
CVE-2012-2820 | Google Chrome before 20.0.1132.43 does not properly implement SVG filters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.41:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-fvr2-v653-59vg | Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033. | []
| null | null | null | null |
|
GHSA-vw34-wv53-96pw | Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null |
|
GHSA-fr7x-wc8q-h255 | rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. | []
| null | null | 7.5 | null |
|
GHSA-wpfg-7xq2-mv49 | File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project. | []
| null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.