id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2024:0745 | Red Hat Security Advisory: Red Hat Ceph Storage 5.3 Security update | rgw: improperly verified POST keys ceph: RGW crash upon misconfigured CORS rule | [
"cpe:/a:redhat:ceph_storage:5.3::el8",
"cpe:/a:redhat:ceph_storage:5.3::el9"
]
| null | 2.6 | null | null | null |
GHSA-rx9w-c6jv-2grg | LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution. | []
| null | 8.8 | null | null | null |
|
GHSA-7wf5-9873-x86r | A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127. | []
| null | 9.8 | null | null | null |
|
CVE-2016-3431 | Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.1.1, 9.3.1.2, 9.3.2, and 9.3.3 allows remote authenticated users to affect confidentiality and integrity via vectors related to Security, a different vulnerability than CVE-2016-3420. | [
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.3:*:*:*:*:*:*:*"
]
| null | null | 6.4 | 3.6 | null |
|
GHSA-q84m-7mh3-gvhw | Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network. | []
| null | 7.5 | null | null | null |
|
GHSA-mhjm-gwxr-wvw2 | PHP remote file inclusion vulnerability in index.php in Miguel Nunes Call of Duty 2 (CoD2) DreamStats System 4.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the rootpath parameter. | []
| null | null | null | null | null |
|
RHSA-2021:2260 | Red Hat Security Advisory: libwebp security update | libwebp: heap-based buffer overflow in PutLE16() libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 9.8 | null | null | null |
GHSA-fj2v-vcw3-478p | Multiple SQL injection vulnerabilities in admin/usercheck.php in FlexPHPDirectory 0.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) checkuser and (2) checkpass parameters. | []
| null | null | null | null | null |
|
CVE-2007-2336 | Unspecified vulnerability in InterVations NaviCOPA Web Server 2.01 20070323 allows remote attackers to cause a denial of service (daemon crash) via crafted HTTP requests, as demonstrated by long requests containing '\A' characters, probably a different issue than CVE-2006-5112 and CVE-2007-1733. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:intervations:navicopa_web_server:2.01_2007-03-23:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 | null |
|
CVE-2016-6392 | Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.1 through 3.9 allow remote attackers to cause a denial of service (device restart) via a crafted IPv4 Multicast Source Discovery Protocol (MSDP) Source-Active (SA) message, aka Bug ID CSCud36767. | [
"cpe:2.3:o:cisco:ios:12.2\\(33\\)cx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)cy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)cy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ira:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ird:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ire:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ire1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ire2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)irh1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)iri:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mra:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb16:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sb17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sca:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sca1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sca2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scb11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scc7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scd8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sce6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scf1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scf2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scf3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scf4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scf5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scg7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sch6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sci:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sci1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sci1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sci2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sci2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sci3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)scj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srb7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)src6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)srd8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre7a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre9a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sre14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)xn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ey1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)sy10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)xa1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)xa2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)xa3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)xa4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)xa5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ed:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)eh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)mr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)mr2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)mr3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)mr4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)ey1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)ey2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)ey4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sng:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)snh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sni:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sni1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s0c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sng:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)snh1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sni:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.3as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 | null |
|
GHSA-242h-9g3g-w3fx | GreenCMS 2.3.0603 has an arbitrary file download vulnerability via an index.php?m=admin&c=media&a=downfile URI. | []
| null | null | 7.5 | null | null |
|
GHSA-vw87-wrx2-xwxq | IBM Common Licensing 9.0 could allow a local user to enumerate usernames due to an observable response discrepancy. IBM X-Force ID: 273337. | []
| null | 4 | null | null | null |
|
CVE-2022-44366 | Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setDiagnoseInfo. | [
"cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null | null |
|
GHSA-v68j-qxmr-9486 | An issue has been discovered in GitLab affecting all versions starting from 15.3 before 15.7.8, versions of 15.8 before 15.8.4, and version 15.9 before 15.9.2. Google IAP details in Prometheus integration were not hidden, could be leaked from instance, group, or project settings to other users. | []
| null | 4.3 | null | null | null |
|
GHSA-3vvm-w3xq-2xq2 | The Star Girl: Colors of Spring (aka com.animoca.google.starGirlSpring) application 3.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null | null |
|
GHSA-mpgq-6jmr-6c67 | Cross-site Scripting in express-cart | The express-cart package through 1.1.10 for Node.js allows Reflected XSS (for an admin) via a user input field for product options. NOTE: the vendor states that this "would rely on an admin hacking his/her own website." | []
| null | 4.8 | null | null | null |
GHSA-x2mv-9qmp-fx7x | SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | []
| null | null | null | null | null |
|
GHSA-q42w-3m49-jxcj | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | []
| null | 7.8 | null | null | null |
|
GHSA-x6xq-whh3-gg32 | Apollo Router Coprocessors may cause Denial-of-Service when handling request bodies | ImpactInstances of the Apollo Router using either of the following may be impacted by a denial-of-service vulnerability.External Coprocessing with specific configurations; orNative Rust Plugins accessing the Router request body in the RouterService layerRouter customizations using Rhai scripts are **not** impacted.When using External Coprocessing:Instances of the Apollo Router running versions >=1.21.0 and <1.52.1 are impacted by a denial-of-service vulnerability if **all** of the following are true:Router has been configured to support External Coprocessing.Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators.You can identify if you are impacted by reviewing your router's configuration YAML for the following config:External Coprocessing was initially made available as an experimental feature with [Router version 1.21.0](https://github.com/apollographql/router/releases/tag/v1.21.0) on 2023-06-20 and was made generally available with [Router version 1.38.0](https://github.com/apollographql/router/releases/tag/v1.38.0) on 2024-01-19. More information about the Router’s [External Coprocessing feature is available here](https://www.apollographql.com/docs/router/customizations/coprocessor).When using Native Rust Plugins:Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if **all** of the following are true:Router has been configured to use a custom-developed Native Rust PluginThe plugin accesses `Request.router_request` in the `RouterService` layerYou are accumulating the body from `Request.router_request` into memoryTo use a plugin, you need to be running a customized Router binary. Additionally, you need to have a `plugins` section with at least one plugin defined in your Router’s configuration YAML. That plugin would also need to define a custom `router_service` method.You can check for a defined plugin by reviewing for the following in your Router’s configuration YAML:You can check for a custom `router_service` method in a plugin, by reviewing for the following function signature in your plugin’s source:More information about the Router’s [Native Rust Plugin feature is available here](https://www.apollographql.com/docs/router/customizations/native).Impact DetailIf using an impacted configuration, the Router will load entire HTTP request bodies into memory without respect to other HTTP request size-limiting configurations like `limits.http_max_request_bytes`. This can cause the Router to be out-of-memory (OOM) terminated if a sufficiently large request is sent to the Router.By default, the Router sets `limits.http_max_request_bytes` to 2 MB. More information about the Router’s [request limiting features is available here](https://www.apollographql.com/docs/router/configuration/overview/#request-limits).Patches[Apollo Router 1.52.1](https://github.com/apollographql/router/releases/tag/v1.52.1)If you have an impacted configuration as defined above, please upgrade to at least Apollo Router 1.52.1.WorkaroundsIf you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the `coprocessor.router.request.body` configuration option to `false`. Please note that changing this configuration option will change the information sent to any coprocessors you have configured and may impact functionality implemented by those coprocessors.If you have developed a Native Rust Plugin and cannot upgrade, you can update your plugin to either not accumulate the request body or enforce a maximum body size limit.You can also mitigate this issue by limiting HTTP body payload sizes prior to the Router (e.g., in a proxy or web application firewall appliance).References[Apollo Router 1.52.1 Release Notes](https://github.com/apollographql/router/releases/tag/v1.52.1)
[External Coprocessing documentation](https://www.apollographql.com/docs/router/customizations/coprocessor)
[HTTP Request Limiting documentation](https://www.apollographql.com/docs/router/configuration/overview/#request-limits)
[Native Rust Plugin documentation](https://www.apollographql.com/docs/router/customizations/native) | []
| 8.7 | 7.5 | null | null | null |
CVE-2007-2873 | SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd. | [
"cpe:2.3:a:spamassassin:spamassassin:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:3.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 1.9 | null |
|
CVE-2019-18304 | A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [
"cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 | null |
|
RHSA-2019:2817 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure | [
"cpe:/a:redhat:openshift:3.11::el7"
]
| null | null | 6.4 | null | null |
GHSA-gx7f-xhxg-cvr3 | Cross-site request forgery (CSRF) vulnerability in the Take Control module 6.x-2.x before 6.x-2.2 for Drupal allows remote attackers to hijack the authentication of unspecified users for Ajax requests that manipulate files. | []
| null | null | null | null | null |
|
GHSA-cr2v-p345-fp24 | A vulnerability has been identified in SIMATIC PC-Station Plus (All versions), SIMATIC S7-400 CPU 412-2 PN V7 (All versions), SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions), SINAMICS S120 (incl. SIPLUS variants) (All versions < V5.2 SP3 HF15), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions). The affected products do not handle HTTP(S) requests to the web server correctly.This could allow an attacker to exhaust system resources and create a denial of service condition for the device. | []
| null | 7.5 | null | null | null |
|
CVE-2018-10995 | SchedMD Slurm before 17.02.11 and 17.1x.x before 17.11.7 mishandles user names (aka user_name fields) and group ids (aka gid fields). | [
"cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 | null |
|
CVE-2024-27149 | Local Privilege Escalation and Remote Code Execution using insecure LD_PRELOAD | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | [
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4515_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4615_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5015_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5115_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2518_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2618_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_ag:-:*:*:*:*:*:*:*"
]
| null | 7.4 | null | null | null |
GHSA-8hpm-p6g9-6c6f | Directory traversal vulnerability in Caucho Resin 3.0.17 and 3.0.18 for Windows allows remote attackers to read arbitrary files via a "C:%5C" (encoded drive letter) in a URL. | []
| null | null | null | null | null |
|
GHSA-qgjq-259r-gp4m | XSS exists in Zoho ManageEngine Netflow Analyzer Professional v7.0.0.2 in the Administration zone "/netflow/jspui/linkdownalertConfig.jsp" file in the autorefTime or graphTypes parameter. | []
| null | null | 6.1 | null | null |
|
GHSA-pm8g-4f93-7m8m | The ArtPlacer Widget WordPress plugin before 2.20.7 does not sanitize and escape the "id" parameter before submitting the query, leading to a SQLI exploitable by editors and above. Note: Due to the lack of CSRF check, the issue could also be exploited via a CSRF against a logged editor (or above) | []
| null | 8.8 | null | null | null |
|
CVE-2008-3915 | Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl. | [
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 | null |
|
GHSA-x37x-qf4v-f54f | Roundup Cross-site Scripting Vulnerability | Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents. | []
| 5.3 | 6.1 | null | null | null |
GHSA-5vm6-jhvv-9rhg | ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials. | []
| null | null | 9.8 | null | null |
|
ICSA-18-030-01 | PHOENIX CONTACT mGuard | mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. CVE-2018-5441 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 7.8 | null | null |
CVE-2021-2348 | Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Tools and Frameworks). The supported version that is affected is 11.3.1.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:commerce_experience_manager:11.3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.1.5:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null | null |
|
CVE-2007-2445 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2019-5779 | Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4.3 | null |
|
GHSA-f5jc-m9w5-r7rr | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site. | []
| null | null | 6.5 | null | null |
|
CVE-2022-3862 | Livemesh Addons for Elementor < 7.2.4 - Admin+ Stored XSS | The Livemesh Addons for Elementor WordPress plugin before 7.2.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [
"cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*"
]
| null | 4.8 | null | null | null |
GHSA-cxh4-3qx8-3c75 | An issue was discovered in CImg v.220. A heap-based buffer over-read in load_bmp in CImg.h occurs when loading a crafted bmp image, a different vulnerability than CVE-2018-7588. This is in a "16 colors" case, aka case 4. | []
| null | null | 7.8 | null | null |
|
CVE-2023-41740 | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to read specific files via unspecified vectors. | [
"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null | null |
|
GHSA-jf8v-3q2w-5v65 | A vulnerability, which was classified as critical, was found in Campcodes Online Movie Theater Seat Reservation System 1.0. This affects the function save_movie of the file /admin/admin_class.php. The manipulation of the argument cover leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.5 | 7.3 | null | null | null |
|
GHSA-m254-f6h4-p93g | Jenkins AsakusaSatellite Plugin Does not Mask API Keys via Job Configuration Form | Jenkins AsakusaSatellite Plugin 0.1.1 and earlier stores AsakusaSatellite API keys unencrypted in job config.xml files on the Jenkins controller as part of its configuration.These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.Additionally, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them.As of publication of this advisory, there is no fix. | []
| null | 4.3 | null | null | null |
GHSA-99cq-hqh8-c6pp | Microsoft Skype through 8.59.0.77 on macOS has the disable-library-validation entitlement, which allows a local process (with the user's privileges) to obtain unprompted microphone and camera access by loading a crafted library and thereby inheriting Skype Client's microphone and camera access. | []
| null | null | null | null | null |
|
CVE-2023-39919 | WordPress wpShopGermany – Protected Shops Plugin <= 2.0 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in maennchen1.De wpShopGermany – Protected Shops plugin <= 2.0 versions. | [
"cpe:2.3:a:maennchen1:wpshopgermany_-_protected_shops:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null | null |
PYSEC-2022-134 | null | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is guarded by a `DCHECK`. However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it results in a crash due to the assertion failure. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range. | []
| null | null | null | null | null |
CVE-2021-34509 | Storage Spaces Controller Information Disclosure Vulnerability | Storage Spaces Controller Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4530:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4530:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null | null |
CVE-2022-1576 | WP Maintenance Mode & Coming Soon < 2.4.5 - Subscribed Users Deletion via CSRF | The WP Maintenance Mode & Coming Soon WordPress plugin before 2.4.5 is lacking CSRF when emptying the subscribed users list, which could allow attackers to make a logged in admin perform such action via a CSRF attack | [
"cpe:2.3:a:themeisle:wp_maintenance_mode_\\&_coming_soon:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | 4.3 | null |
CVE-2002-0224 | The MSDTC (Microsoft Distributed Transaction Service Coordinator) for Microsoft Windows 2000, Microsoft IIS 5.0 and SQL Server 6.5 through SQL 2000 0.0 allows remote attackers to cause a denial of service (crash or hang) via malformed (random) input. | [
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2025-1202 | SourceCodester Best Church Management Software edit_slider.php sql injection | A vulnerability classified as critical has been found in SourceCodester Best Church Management Software 1.1. Affected is an unknown function of the file /admin/edit_slider.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-r66m-27p7-w8fm | Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. | []
| null | 7.8 | null | null | null |
|
CVE-2022-30264 | The Emerson ROC and FloBoss RTU product lines through 2022-05-02 perform insecure filesystem operations. They utilize the ROC protocol (4000/TCP, 5000/TCP) for communications between a master terminal and RTUs. Opcode 203 of this protocol allows a master terminal to transfer files to and from the flash filesystem and carrying out arbitrary file and directory read, write, and delete operations. | [
"cpe:2.3:o:emerson:dl8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:dl8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:roc809_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:roc809:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:roc800l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:roc800l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:fb3000_rtu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:fb3000_rtu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:roc827_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:roc827:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null | null |
|
CVE-2013-2373 | The Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 does not properly implement access control, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors. | [
"cpe:2.3:a:tibco:spotfire_web_player:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_web_player:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_web_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_web_player:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_web_player:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_web_player:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_web_player:5.0.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 | null |
|
CVE-2022-1953 | Product Configurator for WooCommerce < 1.2.32 - Unauthenticated Arbitrary File Deletion | The Product Configurator for WooCommerce WordPress plugin before 1.2.32 suffers from an arbitrary file deletion vulnerability via an AJAX action, accessible to unauthenticated users, which accepts user input that is being used in a path and passed to unlink() without validation first | [
"cpe:2.3:a:product_configurator_for_woocommerce_project:product_configurator_for_woocommerce:*:*:*:*:*:wordpress:*:*"
]
| null | 9.1 | null | 6.4 | null |
CVE-2006-0460 | Multiple buffer overflows in BomberClone before 0.11.6.2 allow remote attackers to execute arbitrary code via long error messages. | [
"cpe:2.3:a:bomberclone:bomberclone:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bomberclone:bomberclone:0.11.6:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
GHSA-r78f-c926-j84x | In PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation. | []
| null | null | null | null | null |
|
RHSA-2018:2938 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Thorntail 2.2.0 security & bug fix update | undertow: Path traversal in ServletResourceManager class jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
]
| null | null | 8.1 | null | null |
CVE-2024-52005 | The sideband payload is passed unfiltered to the terminal in git | Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources. | []
| 7.5 | null | null | null | null |
GHSA-rj88-vqpv-h5j4 | An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory, aka 'Windows Shell Infrastructure Component Elevation of Privilege Vulnerability'. | []
| null | 7.8 | null | null | null |
|
CVE-2016-5859 | In a sound driver in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, if a function is called with a very large length, an integer overflow could occur followed by a buffer overflow. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | 7 | 7.6 | null |
|
CVE-2024-45609 | GLPI has a Reflected XSS in /front/stat.graph.php | GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the reports pages. Upgrade to 10.0.17. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null | null |
CVE-2021-40348 | Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1. | [
"cpe:2.3:a:uyuni-project:uyuni:2021.08:*:*:*:*:*:*:*",
"cpe:2.3:a:spacewalk_project:spacewalk:2.10:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 9.3 | null |
|
GHSA-f7r6-h92h-m93g | Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, Blind SQL Injection in image-gallery-with-slideshow/admin_setting.php via selectMulGallery parameter. | []
| null | null | 9.8 | null | null |
|
GHSA-r2hj-7r96-5669 | The Booking Ultra Pro Appointments Booking Calendar Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the multiple functions in all versions up to, and including, 1.1.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify and delete. multiple plugin options and data such as payments, pricing, booking information, business hours, calendars, profile information, and email templates. | []
| null | 5.4 | null | null | null |
|
CVE-2005-0097 | The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference. | [
"cpe:2.3:a:squid:squid:2.0_patch2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.1_patch2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.3_.stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.3_.stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.3_stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.4_.stable2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.4_.stable6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.4_.stable7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.4_stable7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5.stable7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_.stable1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_.stable3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_.stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_.stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_.stable6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_stable3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.5_stable9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid:squid:2.6.stable1:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
RHSA-2020:5401 | Red Hat Security Advisory: libpq security update | postgresql: Reconnection can downgrade connection security settings postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null | null |
GHSA-w4m2-8qxq-h2wj | Missing Authorization vulnerability in Farhan Noor ApplyOnline – Application Form Builder and Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ApplyOnline – Application Form Builder and Manager: from n/a through 2.5.3. | []
| null | 4.3 | null | null | null |
|
CVE-2021-24277 | RSS for Yandex Turbo < 1.30 - Authenticated Stored Cross-Site Scripting (XSS) | The RSS for Yandex Turbo WordPress plugin before 1.30 did not properly sanitise the user inputs from its Счетчики settings tab before outputting them back in the page, leading to authenticated stored Cross-Site Scripting issues | [
"cpe:2.3:a:wpuslugi:rss_for_yandex_turbo:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | 3.5 | null |
GHSA-x59j-7hmm-r38m | Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6069. | []
| null | null | null | null | null |
|
GHSA-qfrc-4c6q-334p | An issue was discovered in GitLab CE/EE affecting all versions starting from 17.1 prior to 17.6.0, which allows an attacker with maintainer role to trigger a pipeline as project owner under certain circumstances. | []
| null | 4.4 | null | null | null |
|
GHSA-6h87-2fpc-x688 | Integer underflow in Doomsday (aka deng) 1.9.0-beta5.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via a PKT_CHAT packet with a data length less than 3, which triggers an erroneous malloc, possibly related to the Sv_HandlePacket function in sv_main.c. | []
| null | null | null | null | null |
|
GHSA-54q6-gvgx-frm8 | The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call. | []
| null | null | null | null | null |
|
GHSA-gp7m-rmwx-v4gc | On BIG-IP 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, Virtual servers with a OneConnect profile may incorrectly handle WebSockets related HTTP response headers, causing TMM to restart. | []
| null | null | null | null | null |
|
CVE-2012-4816 | IBM Rational Automation Framework (RAF) 3.x through 3.0.0.5 allows remote attackers to bypass intended Env Gen Wizard (aka Environment Generation Wizard) access restrictions by visiting context roots in HTTP sessions on port 8080. | [
"cpe:2.3:a:ibm:rational_automation_framework:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_automation_framework:3.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_automation_framework:3.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_automation_framework:3.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_automation_framework:3.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_automation_framework:3.0.0.5:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
CVE-2017-0825 | An information disclosure vulnerability in the Broadcom wifi driver. Product: Android. Versions: Android kernel. Android ID: A-37305633. References: B-V2017063002. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 | null |
|
ICSA-20-051-04 | Auto-Maskin RP210E, DCU210E, and Marine Observer Pro (Android App) | The embedded web server software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.CVE-2018-5402 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The device software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.CVE-2018-5401 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The software does not properly verify that the source of data or communication is valid.CVE-2018-5400 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H). The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.CVE-2018-5399 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.CVE-2019-6560 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L). The product contains multiple weak password requirements, which makes it easier for attackers to compromise user accounts.CVE-2019-6558 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | []
| null | null | 7.5 | null | null |
GHSA-pv9w-h33g-7w3x | SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows PHAR deserialization that can lead to remote code execution. | []
| null | null | null | null | null |
|
GHSA-cm44-x78v-rrf8 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, and Snapdragon_High_Med_2016, the 'proper' solution for this will be to ensure that any users of qsee_log in the bootchain (before Linux boots) unallocate their buffers and clear the qsee_log pointer. Until support for that is implemented in TZ and the bootloader, enable tz_log to avoid potential scribbling. This solution will prevent the linux kernel memory corruption. | []
| null | null | 9.8 | null | null |
|
CVE-2020-6794 | If a user saved passwords before Thunderbird 60 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Thunderbird 60. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Thunderbird < 68.5. | [
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 | null |
|
GHSA-c5x5-p58w-fxgh | elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c. | []
| null | 4 | null | null | null |
|
GHSA-3h89-7v9c-8256 | Missing Authorization vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2. | []
| null | 6.3 | null | null | null |
|
CVE-2024-25081 | Splinefont in FontForge through 20230101 allows command injection via crafted filenames. | [
"cpe:2.3:a:fontforge:fontforge:20230101:*:*:*:*:*:*:*"
]
| null | 4.2 | null | null | null |
|
CVE-2023-37477 | Command injection in firewall ip functionality in 1Panel | 1Panel is an open source Linux server operation and maintenance management panel. An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. 1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands. An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system. This issue has been addressed in commit `e17b80cff49` which is included in release version `1.4.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| [
"cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null | null |
CVE-2021-45502 | Certain NETGEAR devices are affected by authentication bypass. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | [
"cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
]
| null | 9.6 | null | null | null |
|
CVE-2000-0392 | Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. | [
"cpe:2.3:a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*"
]
| null | null | null | 7.2 | null |
|
GHSA-gjgq-73mh-6p69 | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix disable_otg_wa logic[Why]
When switching to another HDMI mode, we are unnecesarilly
disabling/enabling FIFO causing both HPO and DIG registers to be set at
the same time when only HPO is supposed to be set.This can lead to a system hang the next time we change refresh rates as
there are cases when we don't disable OTG/FIFO but FIFO is enabled when
it isn't supposed to be.[How]
Removing the enable/disable FIFO entirely. | []
| null | 5.5 | null | null | null |
|
RHSA-2024:7262 | Red Hat Security Advisory: osbuild-composer security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null | null |
CVE-2021-44193 | Adobe After Effects MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe After Effects versions 22.0 (and earlier) and 18.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 3.3 | null | null | null |
GHSA-4j2g-7wxj-73hg | In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. | []
| null | 9.8 | null | null | null |
|
CVE-2022-41653 | Daikin SVMPC1 version 2.1.22 and prior and SVMPC2 version 1.2.3 and prior are vulnerable to an attacker obtaining user login credentials and control the system. | [
"cpe:2.3:a:daikinlatam:svmpc1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:daikinlatam:svmpc2:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null | null |
|
CVE-2025-29819 | Windows Admin Center in Azure Portal Information Disclosure Vulnerability | External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally. | []
| null | 6.2 | null | null | null |
GHSA-jhjh-ghwx-6h7r | modulemd uses an unsafe function for processing externally provided data | modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution. | []
| 9.3 | 9.8 | null | null | null |
GHSA-rm6j-8p3f-rxmg | Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Unified Metadata Manager). Supported versions that are affected are 8.0.7-8.1.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | null | null | null |
|
CVE-2023-22848 | Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access. | [
"cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*"
]
| null | 5.5 | null | null | null |
|
CVE-2020-24388 | An issue was discovered in the _send_secure_msg() function of yubihsm-shell through 2.0.2. The function does not validate the embedded length field of a message received from the device. This could lead to an oversized memcpy() call that will crash the running process. This could be used by an attacker to cause a denial of service. | [
"cpe:2.3:a:yubico:yubihsm-shell:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 | null |
|
RHSA-2024:7443 | Red Hat Security Advisory: RHACS 4.5 enhancement and security update | nodejs-async: Regular expression denial of service while parsing function in autoinject | [
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
]
| null | 5.3 | null | null | null |
CVE-2013-1232 | The HTTP implementation in Cisco WebEx Node for MCS, WebEx Meetings Server, and WebEx Node for ASR 1000 Series allows remote attackers to read the contents of uninitialized memory locations via a crafted request, aka Bug IDs CSCue36672, CSCue31363, CSCuf17466, and CSCug61252. | [
"cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_node_for_asr_1000_series:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_node_for_mcs:-:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
GHSA-c263-2vpx-pv8p | The remove API in v1/controller/cloudStorage/alibabaCloud/remove/index.ts in netless Agora Flat Server before 2021-07-30 mishandles file ownership. | []
| null | 9.1 | null | null | null |
|
GHSA-8qr9-mc3w-88c6 | An issue has been discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. An AI feature was found to read unsanitized content in a way that could have allowed an attacker to hide prompt injection. | []
| null | 3.1 | null | null | null |
|
GHSA-cr59-3vcq-rrw6 | Null Pointer Dereference in `coap_client_exchange_blockwise2` function in Keith Cullen FreeCoAP 1.0 allows remote attackers to cause a denial of service and potentially execute arbitrary code via a specially crafted CoAP packet that causes `coap_msg_get_payload(resp)` to return a null pointer, which is then dereferenced in a call to `memcpy`. | []
| null | 5.3 | null | null | null |
|
cisco-sa-XE-ACE-75K3bRWe | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device.
This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"]. | []
| null | 6.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.