id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2023-27987
Apache Linkis gateway module token authentication bypass
In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token
[ "cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-w67p-q3fw-r56g
A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
[]
null
7.1
null
null
CVE-2021-22413
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset.
[ "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2022-35965
Segfault in `LowerBound` and `UpperBound` in TensorFlow
TensorFlow is an open source platform for machine learning. If `LowerBound` or `UpperBound` is given an empty`sorted_inputs` input, it results in a `nullptr` dereference, leading to a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bce3717eaef4f769019fd18e990464ca4a2efeea. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-9pw9-3858-mcgc
Windows Cryptographic Services Remote Code Execution Vulnerability
[]
null
8.4
null
null
CVE-2022-2086
SourceCodester Bank Management System login.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Bank Management System 1.0. Affected by this issue is login.php. The manipulation of the argument password with the input 1'and 1=2 union select 1,sleep(10),3,4,5 --+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:bank_management_system_project:bank_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-2009-2371
Advanced Forum 6.x before 6.x-1.1, a module for Drupal, does not prevent users from modifying user signatures after the associated comment format has been changed to an administrator-controlled input format, which allows remote authenticated users to inject arbitrary web script, HTML, and possibly PHP code via a crafted user signature.
[ "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:a:michelle_cox:advanced_forum:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:michelle_cox:advanced_forum:6.x-1.x-dev:*:*:*:*:*:*:*" ]
null
null
null
6.5
cisco-sa-cucm-apidos-PGsDcdNF
Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability
A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device. This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
8.6
null
null
CVE-2019-5496
Oncommand Insight versions prior to 7.3.5 shipped without certain HTTP Security headers configured which could allow an attacker to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2022-48976
netfilter: flowtable_offload: fix using __this_cpu_add in preemptible
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable_offload: fix using __this_cpu_add in preemptible flow_offload_queue_work() can be called in workqueue without bh disabled, like the call trace showed in my act_ct testing, calling NF_FLOW_TABLE_STAT_INC() there would cause a call trace: BUG: using __this_cpu_add() in preemptible [00000000] code: kworker/u4:0/138560 caller is flow_offload_queue_work+0xec/0x1b0 [nf_flow_table] Workqueue: act_ct_workqueue tcf_ct_flow_table_cleanup_work [act_ct] Call Trace: <TASK> dump_stack_lvl+0x33/0x46 check_preemption_disabled+0xc3/0xf0 flow_offload_queue_work+0xec/0x1b0 [nf_flow_table] nf_flow_table_iterate+0x138/0x170 [nf_flow_table] nf_flow_table_free+0x140/0x1a0 [nf_flow_table] tcf_ct_flow_table_cleanup_work+0x2f/0x2b0 [act_ct] process_one_work+0x6a3/0x1030 worker_thread+0x8a/0xdf0 This patch fixes it by using NF_FLOW_TABLE_STAT_INC_ATOMIC() instead in flow_offload_queue_work(). Note that for FLOW_CLS_REPLACE branch in flow_offload_queue_work(), it may not be called in preemptible path, but it's good to use NF_FLOW_TABLE_STAT_INC_ATOMIC() for all cases in flow_offload_queue_work().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2020-11548
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
[ "cpe:2.3:a:search_meter_project:search_meter:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
7.5
GHSA-6fq9-25jp-jqrj
The Management Agent in F-Secure Policy Manager 5.11.2810 allows remote attackers to gain sensitive information, such as the absolute path for the web server, via an HTTP request to fsmsh.dll without any parameters.
[]
null
null
null
null
GHSA-rq2f-rgc6-gfh9
Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not handle errors thrown while constructing certain http requests. A remote authenticated user may construct malicious requests to cause the traffic controller to leave dangling TCP connections, which could cause denial of service.
[]
null
null
6.5
null
GHSA-rx59-33mv-93w9
Cross-site scripting (XSS) vulnerability in myEZshop Shopping Cart allows remote attackers to inject arbitrary web script or HTML via the Keyword parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-9g52-94mh-627c
In EMC Avamar Server Software 7.3.1-125, 7.3.0-233, 7.3.0-226, 7.2.1-32, 7.2.1-31, 7.2.0-401, an unauthenticated remote attacker may potentially bypass the authentication process to gain access to the system maintenance page. This may be exploited by an attacker to view sensitive information, perform software updates, or run maintenance workflows.
[]
null
null
9.8
null
GHSA-2vf4-9qc5-m6pf
Cross-site scripting (XSS) vulnerability in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, and 8.5.x through 8.5.6.0 and WebSphere Lombardi Edition (WLE) 7.2.x through 7.2.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[]
null
null
null
null
GHSA-24h9-pprg-mj7w
Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory.
[]
null
7.2
null
null
GHSA-g243-92m7-2j54
Buffer overflow in the parse_emelody function in parse_emelody.c for ringtonetools 2.22 allows remote attackers to execute arbitrary code via a crafted eMelody file.
[]
null
null
null
null
CVE-2018-0873
ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
GHSA-j4mv-crqr-wwhj
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors related to the Google V8 bindings, aka "Universal XSS (UXSS)."
[]
null
null
null
null
GHSA-c96m-4x43-q999
Integer overflow in Trihedral Engineering VTScada (formerly VTS) 6.5 through 9.x before 9.1.20, 10.x before 10.2.22, and 11.x before 11.1.07 allows remote attackers to cause a denial of service (server crash) via a crafted request, which triggers a large memory allocation.
[]
null
null
null
null
GHSA-4g9x-65q8-9448
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
[]
null
9.8
null
null
GHSA-h76c-22cc-xhhx
vzctl before 4.9.4 determines the virtual environment (VE) layout based on the presence of root.hdd/DiskDescriptor.xml in the VE private directory, which allows local simfs container (CT) root users to change the root password for arbitrary ploop containers, as demonstrated by a symlink attack on the ploop container root.hdd file and then access a control panel.
[]
null
null
null
null
CVE-2023-6693
Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/a:redhat:advanced_virtualization:8::el8", "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-h6xf-ppj3-93fx
A cross-site-scripting (XSS) vulnerability exists when an open source customization for Microsoft Active Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected AD FS server, aka "Active Directory Federation Services XSS Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
[]
null
null
5.4
null
CVE-2010-1077
Directory traversal vulnerability in vbseo.php in Crawlability vBSEO plugin 3.1.0 for vBulletin allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the vbseourl parameter.
[ "cpe:2.3:a:vbseo:vbseo:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-qjjr-w5p7-vjhm
Multiple vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the Aruba EdgeConnect Enterprise Orchestrator instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the Aruba EdgeConnect Enterprise Orchestrator host in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.
[]
null
8.8
null
null
GHSA-73x9-xqqp-w963
A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
[]
2.3
3.1
null
null
RHSA-2023:6808
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
CVE-2017-9299
Open Ticket Request System (OTRS) 3.3.9 has XSS in index.pl?Action=AgentStats requests, as demonstrated by OrderBy=[XSS] and Direction=[XSS] attacks. NOTE: this CVE may have limited relevance because it represents a 2017 discovery of an issue in software from 2014. The 3.3.20 release, for example, is not affected.
[ "cpe:2.3:a:otrs:otrs:3.3.9:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-73x8-ccpr-jw52
IBM Concert Software 1.0.0 and 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
[]
null
5.9
null
null
GHSA-7m7m-wc8x-6mfv
HPE Project and Portfolio Management Center (PPM) 9.2x and 9.3x before 9.32.0002 allows remote authenticated users to execute arbitrary commands or obtain sensitive information via unspecified vectors.
[]
null
8.8
null
null
GHSA-7q5g-gph2-4rc6
Upload of file to arbitrary path in Apache Flink
Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
[]
null
7.5
null
null
CVE-2006-0368
Cisco CallManager 3.2 and earlier, 3.3 before 3.3(5)SR1, 4.0 before 4.0(2a)SR2c, and 4.1 before 4.1(3)SR2 allow remote attackers to (1) cause a denial of service (CPU and memory consumption) via a large number of open TCP connections to port 2000 and (2) cause a denial of service (fill the Windows Service Manager communication queue) via a large number of TCP connections to port 2001, 2002, or 7727.
[ "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.3\\(3\\)es61:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.3\\(4\\)es25:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)es30:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.0\\(2a\\)es40:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.0\\(2a\\)es62:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.0\\(2a\\)sr2b:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.1\\(2\\)es33:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.1\\(2\\)es55:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)es07:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)es32:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2022-24684
HashiCorp Nomad and Nomad Enterprise 0.9.0 through 1.0.16, 1.1.11, and 1.2.5 allow operators with job-submit capabilities to use the spread stanza to panic server agents. Fixed in 1.0.18, 1.1.12, and 1.2.6.
[ "cpe:2.3:a:hashicorp:nomad:*:*:*:*:-:*:*:*", "cpe:2.3:a:hashicorp:nomad:*:*:*:*:enterprise:*:*:*" ]
null
6.5
null
4
CVE-2016-0832
Setup Wizard in Android 5.1.x before LMY49H and 6.x before 2016-03-01 allows physically proximate attackers to bypass the Factory Reset Protection protection mechanism and delete data via unspecified vectors, aka internal bug 25955042.
[ "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
6.1
6.6
CVE-2024-20524
Cisco Small Business RV042, RV042G, RV320, and RV325 Denial of Service Vulnerabilities
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device. &nbsp; This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
[ "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-qm2f-w2gq-vqp6
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted file may lead to arbitrary code execution.
[]
null
7.8
null
null
CVE-2005-0202
Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.
[ "cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailman:2.1b1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-cvpr-72qq-65cc
A local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3.
[]
null
null
null
null
GHSA-j6rq-mppc-h3jr
A flaw was found in FFmpeg. This vulnerability allows unexpected additional CPU load and storage consumption, potentially leading to degraded performance or denial of service via the demuxing of arbitrary data as XBIN-formatted data without proper format validation.
[]
null
5.3
null
null
RHSA-2022:0188
Red Hat Security Advisory: kernel security and bug fix update
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: fs_context: heap overflow in legacy parameter handling
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
CVE-2018-6911
The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument (aka the command parameter).
[ "cpe:2.3:a:advantech:webaccess:8.3.0:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2024-8225
Tenda G3 SetSysTimeCfg formSetSysTime stack-based overflow
A vulnerability, which was classified as critical, was found in Tenda G3 15.11.0.20. Affected is the function formSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument sysTimePolicy leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:tenda:g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:g3_firmware:15.11.0.20:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
cisco-sa-dnac-xss-HfV73cS3
Cisco DNA Center Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco DNA Center software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have administrative credentials on the affected device. There are no workarounds that address this vulnerability.
[]
null
4.8
null
null
PYSEC-2020-209
null
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
[]
null
null
null
null
GHSA-wgfj-mq6g-x2v5
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
[]
null
null
6.8
null
CVE-2002-0026
Internet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
[ "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-q3m4-j7fx-35xr
The ProfileGrid – User Profiles, Memberships, Groups and Communities WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the pm_user_avatar and pm_cover_image parameters found in the ~/admin/class-profile-magic-admin.php file which allows attackers with authenticated user access, such as subscribers, to inject arbitrary web scripts into their profile, in versions up to and including 1.2.7.
[]
null
null
null
null
GHSA-9vcm-qr3v-wvvx
A SQL injection vulnerability in wy_controlls/wy_side_visitor.php of Wayang-CMS v1.0 allows attackers to obtain sensitive database information.
[]
null
null
null
null
CVE-2016-9351
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The directory traversal/file upload error allows an attacker to upload and unpack a zip file.
[ "cpe:2.3:a:advantech:susiaccess:*:*:*:*:*:*:*:*" ]
null
null
7
6
CVE-2009-1307
The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
ICSA-25-105-06
National Instruments LabVIEW
LabVIEW 2025 Q1 and prior versions are vulnerable to an out-of-bounds write when parsing user-supplied data, which may allow an attacker to remotely execute arbitrary code. LabVIEW 2025 Q1 and prior versions are vulnerable to an out-of-bounds write when parsing user-supplied data, which may allow an attacker to remotely execute arbitrary code.
[]
null
7.8
null
null
CVE-2006-3752
Multiple SQL injection vulnerabilities in class.php in Professional Home Page Tools Guestbook allow remote attackers to execute arbitrary SQL commands via the (1) hidemail, (2) name, (3) mail, (4) ip, or (5) text parameters.
[ "cpe:2.3:a:professional_home_page_tools:professional_home_page_tools_guestbook:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-wmjp-jcfp-7jf8
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
[]
null
null
null
null
CVE-2020-18280
Cross Site Scripting vulnerability found in Phodal CMD v.1.0 allows a local attacker to execute arbitrary code via the EMBED SRC function.
[ "cpe:2.3:a:md_project:md:1.0:*:*:*:*:wechat:*:*" ]
null
6.1
null
null
GHSA-whqr-v2xf-6j78
The selection query in SAP Treasury and Risk Management (Transaction Management) (EA-FINSERV?versions 600, 603, 604, 605, 606, 616, 617, 618, 800 and S4CORE versions 101, 102, 103, 104) returns more records than it should be when selecting and displaying the contract number, leading to Missing Authorization Check.
[]
null
4.3
null
null
CVE-2019-1336
An elevation of privilege vulnerability exists in the Microsoft Windows Update Client when it does not properly handle privileges, aka 'Microsoft Windows Update Client Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1323.
[ "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-3gwx-2xm3-mrcj
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
[]
null
4.8
null
null
GHSA-4xqv-2fh4-rrc6
The FOREX.com FOREXTrader for iPhone app 2.9.12 through 2.9.14 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
5.9
null
CVE-2024-7288
SourceCodester Establishment Billing Management System sql injection
A vulnerability was found in SourceCodester Establishment Billing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=delete_block. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273157 was assigned to this vulnerability.
[ "cpe:2.3:a:sourcecodester:establishment_billing_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-8jrg-2wj2-p7hp
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a validation issue existed in the parsing of 407 responses. This issue was addressed through improved response validation.
[]
null
null
6.5
null
ICSA-17-213-01
Mitsubishi Electric Europe B.V. E-Designer
Six code sections have been identified in which exploiting this vulnerability can overwrite the stack. This can result in arbitrary code execution, compromised data integrity, denial of service, and system crash.CVE-2017-9638 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Five code sections have been identified in which exploiting this vulnerability can overwrite the heap. This can result in arbitrary code execution, compromised data integrity, denial of service, and system crash.CVE-2017-9636 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Two code sections have been identified in which exploiting this vulnerability can allow a remote attacker to write data to arbitrary memory locations. This can result in arbitrary code execution, compromised data integrity, denial of service, and system crash.CVE-2017-9634 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
GHSA-v8qq-c98c-j8wf
Missing Authorization vulnerability in Flothemes Flo Forms.This issue affects Flo Forms: from n/a through 1.0.42.
[]
null
5.3
null
null
GHSA-gxwg-94gc-r879
The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.
[]
null
null
null
null
CVE-2023-2455
Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.
[ "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
5.4
null
null
RHSA-2023:1403
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
CVE-2024-11449
Server-Side Request Forgery in haotian-liu/llava
A vulnerability in haotian-liu/llava version 1.2.0 (LLaVA-1.6) allows for Server-Side Request Forgery (SSRF) through the /run/predict endpoint. An attacker can gain unauthorized access to internal networks or the AWS metadata endpoint by sending crafted requests that exploit insufficient validation of the path parameter. This flaw can lead to unauthorized network access, sensitive data exposure, and further exploitation within the network.
[]
null
null
7.5
null
CVE-2023-44794
An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL.
[ "cpe:2.3:a:dromara:sa-token:-:*:*:*:*:*:*:*", "cpe:2.3:a:dromara:sa-token:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-4grj-7gv3-r7f2
IBM Marketing Operations 7.x and 8.x before 8.5.0.7.2, 8.6.x before 8.6.0.8, 9.0.x before 9.0.0.4.1, 9.1.0.x before 9.1.0.5, and 9.1.1.x before 9.1.1.2 allows remote authenticated users to upload arbitrary GIFAR files, and consequently modify data, via unspecified vectors.
[]
null
null
null
null
GHSA-pw97-45hw-hhm3
The Advanced Post Block – Display Posts, Pages, or Custom Posts on Your Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the apbPosts() function hooked via an AJAX action in all versions up to, and including, 1.13.1. This makes it possible for unauthenticated attackers to retrieve all post data, including those that may be password protected.
[]
null
5.3
null
null
GHSA-xh89-vmqr-6c3j
Cross-site scripting (XSS) vulnerability in search.php for PhpBB 2.0.4 and 2.0.9 allows remote attackers to inject arbitrary HTMl or web script via the search_author parameter.
[]
null
null
null
null
RHSA-2007:0391
Red Hat Security Advisory: file security update
file integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
ICSA-23-325-01
WAGO PFC200 Series
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
[]
null
2.7
null
null
CVE-2022-20809
Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities
Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:expressway:*:*:*" ]
null
4.3
null
null
GHSA-6c3f-p5wp-34mh
OS Command Injection in async-git
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
[]
null
9.8
null
null
CVE-2018-14888
inc/plugins/thankyoulike.php in the Eldenroot Thank You/Like plugin before 3.1.0 for MyBB allows XSS via a post or thread subject.
[ "cpe:2.3:a:thank_you\\/like_project:thank_you\\/like:*:*:*:*:*:mybb:*:*" ]
null
null
6.1
4.3
GHSA-5fxp-6x34-j5xh
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/boot.sh has 0777 permissions, allowing local users to control the commands executed at system start-up.
[]
null
null
7.8
null
CVE-2016-7854
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, CVE-2016-7019, CVE-2016-7852, and CVE-2016-7853.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2019-10305
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
[ "cpe:2.3:a:jenkins:xebialabs_xl_deploy:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
CVE-2023-29758
An issue found in Blue Light Filter v.1.5.5 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files.
[ "cpe:2.3:a:leap:blue_light_filter:1.5.5:*:*:*:*:android:*:*" ]
null
5.5
null
null
CVE-2021-43462
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the username parameter.
[ "cpe:2.3:a:rumble_mail_server_project:rumble_mail_server:0.51.3135:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-g3mv-6x7g-35gc
PHP remote file inclusion vulnerability in includes/common.php in NitroTech 0.0.3a allows remote attackers to execute arbitrary PHP code via a URL in the root parameter.
[]
null
null
null
null
GHSA-rqqq-39qr-jj5r
Directory traversal vulnerability in sesskglogadmin.php in KGB 1.9 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the skinnn parameter, as demonstrated by invoking kg.php with a postek parameter containing PHP code, which is injected into a file in the kg directory, and then included by sesskglogadmin.php.
[]
null
null
null
null
CVE-2012-1717
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
[ "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite_with_embedded_oracle:5.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2017:1104
Red Hat Security Advisory: firefox security update
libevent: Stack-buffer overflow in the name_parse() function libevent: Stack-buffer overflow in evutil_parse_sockaddr_port() libevent: Out-of-bounds read in search_make_new() Mozilla: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in text input selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in SMIL animation functions (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during focus handling (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during transaction processing in the editor (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write with malicious font in Graphite 2 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsAutoPtr during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsTArray Length() during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in txExecutionState destructor during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free with selection during scroll events (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during style changes (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write during BinHex decoding (MFSA 2017-11, MFSA 2017-12) Mozilla: Buffer overflow while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Uninitialized values used while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read during glyph processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write in ClearKeyDecryptor (MFSA 2017-11, MFSA 2017-12) Mozilla: Crash during bidirectional unicode manipulation with animation (MFSA 2017-11, MFSA 2017-12) Mozilla: Buffer overflow in WebGL (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in frame selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Memory corruption with accessibility and DOM manipulation (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read in ConvolvePixel (MFSA 2017-11, MFSA 2017-12) Mozilla: Potential Buffer overflow in flex-generated code (MFSA 2017-11, MFSA 2017-12)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
CVE-2017-8190
FusionSphere OpenStack V100R006C00SPC102(NFV)has an improper verification of cryptographic signature vulnerability. The software does not verify the cryptographic signature. An attacker with high privilege may exploit this vulnerability to inject malicious software.
[ "cpe:2.3:o:huawei:fusionsphere_openstack:v100r006c00spc102\\(nfv\\):*:*:*:*:*:*:*" ]
null
null
6.7
4.6
GHSA-cpmg-9xq8-3934
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
[]
null
10
null
null
CVE-2008-1585
Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2006-5529
Cross-site scripting (XSS) vulnerability in smumdadotcom_ascyb_alumni/mod.php in SchoolAlumni Portal 2.26 allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search operation in the katalog module. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:schoolalumni_portal:schoolalumni_portal:2.26:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-hcpv-5mx9-q6h3
SQL injection vulnerability in index.php in DreamPics Builder allows remote attackers to execute arbitrary SQL commands via the page parameter.
[]
null
null
null
null
RHSA-2003:290
Red Hat Security Advisory: mod_ssl, openssl security update for Stronghold
security flaw CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
[ "cpe:/a:redhat:stronghold:4" ]
null
null
null
null
CVE-2016-2018
HPE Systems Insight Manager (SIM) before 7.5.1 allows remote attackers to obtain sensitive information or modify data via unspecified vectors.
[ "cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:matrix_operating_environment:*:*:*:*:*:*:*:*" ]
null
null
9.1
6.4
GHSA-xjr2-5jrg-45g7
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
CVE-2013-1049
Buffer overflow in the RFC1413 (ident) client in cfingerd 1.4.3-3 allows remote IDENT servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted response.
[ "cpe:2.3:a:debian:cfingerd:1.4.3-3:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2019-15445
The Samsung S7 Android device with a build fingerprint of samsung/heroltexx/herolte:8.0.0/R16NW/G930FXXS4ESC3:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[ "cpe:2.3:o:samsung:galaxy_s7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-v4p4-8hcj-96vv
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows CSC Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1489.
[]
null
7.8
null
null
CVE-2018-1000652
JabRef version <=4.3.1 contains a XML External Entity (XXE) vulnerability in MsBibImporter XML Parser that can result in disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted MsBib file. This vulnerability appears to have been fixed in after commit 89f855d.
[ "cpe:2.3:a:jabref:jabref:*:*:*:*:*:*:*:*" ]
null
null
10
7.5
CVE-2017-14895
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, after a subsystem reset, iwpriv is not giving correct information.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2019-11168
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
[ "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*" ]
null
9.1
null
6.4