id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-8v98-rw2q-4wmp | The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies. | []
| null | 7.5 | null | null | null |
|
GHSA-ggvq-2qg5-hr73 | Cross-site scripting (XSS) vulnerability in PhpShop 0.8.1 allows remote attackers to inject arbitrary web script or HTML via the order_id parameter in an order/order_print action to the default URI. | []
| null | null | null | null | null |
|
GHSA-q6pp-3q54-qw37 | In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running "go get -u". | []
| null | 8.1 | null | null | null |
|
GHSA-47p7-wrjh-v2c5 | Out of bound memory access during music playback with modified content due to copying data without checking destination buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | []
| null | null | null | null | null |
|
RHSA-2023:7254 | Red Hat Security Advisory: dotnet8.0 security update | dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 5.5 | null | null | null |
GHSA-hc79-6665-vr5h | The Boat Browser application before 4.2 and Boat Browser Mini application before 3.9 for Android do not properly implement the WebView class, which allows attackers to obtain sensitive information via a crafted application. | []
| null | null | null | null | null |
|
CVE-2021-44055 | Information leakage in Video Station | An missing authorization vulnerability has been reported to affect QNAP device running Video Station. If exploited, this vulnerability allows remote attackers to access data or perform actions that they should not be allowed to perform. We have already fixed this vulnerability in the following versions of Video Station: Video Station 5.5.9 ( 2022/02/16 ) and later | [
"cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null | null |
CVE-2025-38195 | LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset() | In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()
ERROR INFO:
CPU 25 Unable to handle kernel paging request at virtual address 0x0
...
Call Trace:
[<900000000023c30c>] huge_pte_offset+0x3c/0x58
[<900000000057fd4c>] hugetlb_follow_page_mask+0x74/0x438
[<900000000051fee8>] __get_user_pages+0xe0/0x4c8
[<9000000000522414>] faultin_page_range+0x84/0x380
[<9000000000564e8c>] madvise_vma_behavior+0x534/0xa48
[<900000000056689c>] do_madvise+0x1bc/0x3e8
[<9000000000566df4>] sys_madvise+0x24/0x38
[<90000000015b9e88>] do_syscall+0x78/0x98
[<9000000000221f18>] handle_syscall+0xb8/0x158
In some cases, pmd may be NULL and rely on NULL as the return value for
processing, so it is necessary to determine this situation here. | []
| null | null | null | null | null |
CVE-2011-2861 | Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 | null |
|
GHSA-jh24-9fr3-qv95 | index.php in EJ3 TOPo 2.2.178 allows remote attackers to overwrite existing entries and establish new passwords for the overwritten entries via a URL with a modified entry ID. | []
| null | null | null | null | null |
|
CVE-2021-25748 | Ingress-nginx `path` sanitization can be bypassed with newline character | A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | [
"cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*"
]
| null | 7.6 | null | null | null |
RHSA-2008:0980 | Red Hat Security Advisory: flash-plugin security update | Flash movie can determine whether a TCP port is open Flash Player cross-domain and cross-site scripting flaws flash: clipboard hijack attack flash-plugin: upload/download user interaction Adobe Flash Player clickjacking Flash Player XSS Flash Player DNS rebind attack jar: protocol handler Flash Player policy file interpretation flaw Flash Player HTML injection flaw security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
]
| null | null | null | null | null |
CVE-2004-1701 | Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication. | [
"cpe:2.3:a:gnu:cfengine:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.5:b1:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.5:pre:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.5:pre2:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.7:p3:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.0.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.1.0:a6:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.1.0:a8:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.1.0:a9:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:2.1.7:p1:*:*:*:*:*:*"
]
| null | null | null | 10 | null |
|
CVE-2005-2739 | Keychain Access in Mac OS X 10.4.2 and earlier keeps a password visible even if a keychain times out while the password is being viewed, which could allow attackers with physical access to obtain the password. | [
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 | null |
|
CVE-2014-3923 | Multiple cross-site scripting (XSS) vulnerabilities in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the logoLink parameter to (1) preview.swf, (2) preview_skin_rouge.swf, (3) preview_allchars.swf, or (4) preview_skin_overlay.swf in deploy/. | [
"cpe:2.3:a:digitalzoomstudio:video_gallery:-:-:-:*:-:wordpress:*:*"
]
| null | null | null | 4.3 | null |
|
CVE-2024-11254 | AMP for WP – Accelerated Mobile Pages <= 1.1.1 - Reflected Cross-Site Scripting | The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the disqus_name parameter in all versions up to, and including, 1.1.1 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null | null |
CVE-2018-3156 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 | null |
|
ICSA-22-349-14 | Siemens SISCO MMS-EASE Third Party Component | The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet. | []
| null | 7.5 | null | null | null |
GHSA-hf9h-c8cv-r62j | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Winwar Media WordPress Email Marketing Plugin – WP Email Capture.This issue affects WordPress Email Marketing Plugin – WP Email Capture: from n/a through 3.10. | []
| null | 5.3 | null | null | null |
|
GHSA-23gm-hjpg-qfp3 | ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector. | []
| null | 9.8 | null | null | null |
|
RHSA-2019:1771 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-imapd: buffer overflow in CalDAV request handling triggered by a long iCalendar property name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | null | 5.6 | null | null |
CVE-2018-3060 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 5.5 | null |
|
CVE-2018-11185 | Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 43 of 46). | [
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.5 | null |
|
GHSA-pp62-p6gv-gqgj | Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization. | []
| null | null | null | null | null |
|
CVE-2025-20979 | Out-of-bounds write in libsavscmn prior to Android 15 allows local attackers to execute arbitrary code. | []
| null | 8.4 | null | null | null |
|
CVE-2018-1000184 | A server-side request forgery vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubPluginConfig.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. | [
"cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:*"
]
| null | null | 5.4 | 5.5 | null |
|
RHSA-2019:4326 | Red Hat Security Advisory: fribidi security update | fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 7.8 | null | null |
CVE-2002-0406 | Menasoft SPHERE server 0.99x and 0.5x allows remote attackers to cause a denial of service by establishing a large number of connections to the server without providing login credentials, which prevents other users from being able to log in. | [
"cpe:2.3:a:menasoft:sphereserver:0.99f:*:*:*:*:*:*:*",
"cpe:2.3:a:menasoft:sphereserver:0.99i:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
GHSA-74qx-gg8g-9m92 | Directory traversal vulnerability in CommuniGate Pro 4.0b4 and possibly earlier versions allows remote attackers to list the contents of the WebUser directory and its parent directory via a (1) .. (dot dot) or (2) . (dot) in a URL. NOTE: it is not clear whether this issue reveals any more information regarding directory structure than is already available to any CommuniGate Pro user, although there is a possibility that it could be used to infer product version information. | []
| null | null | null | null | null |
|
ICSA-18-352-03 | 3S-Smart Software Solutions GmbH CODESYS Control V3 Products | User access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials. CVE-2018-10612 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | []
| null | null | 9.8 | null | null |
GHSA-9gx6-8hww-xm54 | An issue in Ocuco Innovation Tracking.exe v.2.10.24.51 allows a local attacker to escalate privileges via the modification of TCP packets. | []
| null | 7.8 | null | null | null |
|
RHSA-2014:1320 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
]
| null | null | 4.8 | null | null |
GHSA-3g87-jvpr-fg65 | PrestaShop 1.7.2.4 allows user enumeration via the Reset Password feature, by noticing which reset attempts do not produce a "This account does not exist" error message. | []
| null | null | 5.3 | null | null |
|
GHSA-vxj5-2742-4q53 | Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition. | []
| null | null | null | null | null |
|
CVE-2011-4782 | Cross-site scripting (XSS) vulnerability in libraries/config/ConfigFile.class.php in the setup interface in phpMyAdmin 3.4.x before 3.4.9 allows remote attackers to inject arbitrary web script or HTML via the host parameter. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.8.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 | null |
|
CVE-2023-28700 | ITPison OMICARD EDM - Arbitrary File Upload | OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service. | [
"cpe:2.3:a:itpison:omicard_edm:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | null | null |
CVE-2020-27631 | In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random. | [
"cpe:2.3:a:oryx-embedded:cyclonetcp:1.9.6:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null | null |
|
GHSA-vwqh-cmvp-6694 | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8290, CVE-2018-8294. | []
| null | null | 7.5 | null | null |
GHSA-x9cg-mcvj-x6x6 | A vulnerability, which was classified as problematic, has been found in SourceCodester FAQ Management System 1.0. Affected by this issue is some unknown functionality of the component Update FAQ. The manipulation of the argument Frequently Asked Question leads to cross site scripting. The attack may be launched remotely. VDB-255386 is the identifier assigned to this vulnerability. | []
| null | 3.5 | null | null | null |
|
GHSA-gv9g-xpx2-56j4 | Rejected reason: Not used | []
| null | null | null | null | null |
|
GHSA-6rw5-p447-f2w5 | EMC Unisphere for VMAX 8.x before 8.0.3.4 sets up the Java Debugging Wire Protocol (JDWP) service, which allows remote attackers to execute arbitrary code via unspecified vectors. | []
| null | null | null | null | null |
|
GHSA-2cqg-q7jm-j35c | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | []
| null | null | 3.9 | null | null |
CVE-2022-24156 | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetVirtualSer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter. | [
"cpe:2.3:o:tenda:ax3_firmware:16.03.12.10_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 | null |
|
CVE-2022-40671 | WordPress Rate my Post – WP Rating System plugin <= 3.3.4 - Cross-Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Rate my Post – WP Rating System plugin <= 3.3.4 at WordPress. | [
"cpe:2.3:a:blazzdev:rate_my_post_-_wp_rating_system:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null | null |
CVE-2024-37894 | Squid vulnerable to heap corruption in ESI assign | Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack. | []
| null | 6.3 | null | null | null |
GHSA-6g24-6w3x-338j | Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null | null |
|
GHSA-xjpv-48qr-cg8g | The official eggdrop Docker images before 1.8.4rc2 contain a blank password for a root user. Systems using the Eggdrop Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password. | []
| null | null | null | null | null |
|
CVE-2016-9981 | IBM AppScan Enterprise Edition 9.0 contains an unspecified vulnerability that could allow an attacker to hijack a valid user's session. IBM X-Force ID: 120257 | [
"cpe:2.3:a:ibm:security_appscan:9.0.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.0.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.1.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.1.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.2.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.3.5:*:*:*:enterprise:*:*:*"
]
| null | null | 8.1 | 6.8 | null |
|
RHSA-2008:0576 | Red Hat Security Advisory: rdesktop security update | rdesktop: iso_recv_msg() Integer Underflow Vulnerability | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null | null |
RHSA-2018:3522 | Red Hat Security Advisory: spice-server security update | spice: Possible buffer overflow via invalid monitor configurations | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 9.1 | null | null |
CVE-2018-18445 | In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 | null |
|
GHSA-q9hf-wj5h-x9vx | A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. | []
| null | null | 7.5 | null | null |
|
CVE-2017-18322 | Cryptographic key material leaked in WCDMA debug messages in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 | null |
|
GHSA-p2qj-cw7j-f6wr | OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet. | []
| null | null | null | null | null |
|
GHSA-m7vj-mcjg-2mx3 | CLRF injection in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to write to a protected configuration file on disk. | []
| null | 6.6 | null | null | null |
|
GHSA-jrgv-wc94-68jw | An issue was discovered in MalwareFox AntiMalware 2.74.0.150. Improper access control in zam32.sys and zam64.sys allows a non-privileged process to register itself with the driver by connecting to the filter communication port and then using IOCTL 0x8000204C to \\.\ZemanaAntiMalware to elevate privileges. | []
| null | null | 7.8 | null | null |
|
CVE-2017-17940 | PHP Scripts Mall Single Theater Booking has XSS via the title parameter to admin/sitesettings.php. | [
"cpe:2.3:a:single_theater_booking_script_project:single_theater_booking_script:3.2.2:*:*:*:*:*:*:*"
]
| null | null | 4.8 | 3.5 | null |
|
GHSA-ccg7-gh5h-4h2c | In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: fix out of bounds writeSize can be any value and is user controlled resulting in overwriting the
40 byte array wr_buf with an arbitrary length of data from buf. | []
| null | null | null | null | null |
|
GHSA-7v5v-9v8r-w864 | Inadequate Encryption Strength in Apache CXF | Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack." | []
| null | null | null | null | null |
CVE-2016-9859 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in import feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.4:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 | null |
|
GHSA-pppp-2244-385q | A DNS server allows inverse queries. | []
| null | null | null | null | null |
|
GHSA-3q37-hvwq-f7ph | A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x0045ab7c` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. | []
| null | 7.2 | null | null | null |
|
GHSA-j9vp-g45w-363m | Cross-site scripting (XSS) vulnerability in the Webform Matrix Component module 7.x-4.x before 7.x-4.13 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null | null |
|
GHSA-f43m-hhj4-q3jg | Liferay Portal and Liferay DXP Includes LDAP Credentials in the Page URL | The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.0 fix pack 102 and earlier, 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before update 4, and DXP 7.4 GA includes the LDAP credential in the page URL when paginating through the list of users, which allows man-in-the-middle attackers or attackers with access to the request logs to see the LDAP credential. | []
| null | 5.9 | null | null | null |
GHSA-q8vp-9pjp-8vc7 | The `specializedRendering` function in Rocket.Chat server before 3.9.2 allows a cross-site scripting (XSS) vulnerability by way of the `value` parameter. | []
| null | 5.4 | null | null | null |
|
GHSA-3hp7-3fxw-3v9g | The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function. | []
| null | 7.5 | null | null | null |
|
RHSA-2023:7531 | Red Hat Security Advisory: pixman security update | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 7 | null | null | null |
CVE-2008-4910 | The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method. | [
"cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 | null |
|
GHSA-pmv2-vq2x-c74g | Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page. | []
| null | 4.3 | null | null | null |
|
CVE-2014-2678 | The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*"
]
| null | null | null | 4.7 | null |
|
GHSA-w97x-xfxf-f9xj | Jakarta Tomcat Denial of Service vulnerability | Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp. | []
| null | null | null | null | null |
GHSA-xr2p-8p3f-gvvg | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | []
| null | null | null | null | null |
|
CVE-2011-0430 | Double free vulnerability in the Rx server process in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions allows remote attackers to cause a denial of service and execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
GHSA-xh3j-9hv7-3jxm | The 3Com 3CRWER100-75 router with 1.2.10ww software, when enabling an optional virtual server, configures this server to accept all source IP addresses on the external (Internet) interface unless the user selects other options, which might expose the router to unintended incoming traffic from remote attackers, as demonstrated by setting up a virtual server on port 80, which allows remote attackers to access the web management interface. | []
| null | null | null | null | null |
|
GHSA-mjq9-8vf6-qh49 | Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | []
| null | 8.8 | null | null | null |
|
GHSA-vgcf-p9vp-mqrr | SQL injection vulnerability in marks.php in NukeBookmarks 0.6 for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the category parameter. | []
| null | null | null | null | null |
|
CVE-2021-2288 | Vulnerability in the Oracle Bills of Material product of Oracle E-Business Suite (component: Bill Issues). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Bills of Material. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Bills of Material accessible data as well as unauthorized access to critical data or complete access to all Oracle Bills of Material accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:bills_of_material:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null | null |
|
CVE-2022-47896 | In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks. | [
"cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*"
]
| null | 5 | null | null | null |
|
GHSA-xc42-985m-4jpv | Incorrect security UI in Notifications in Google Chrome on Android prior to 103.0.5060.53 allowed a remote attacker to obscure the full screen notification via a crafted HTML page. (Chromium security severity: Low) | []
| null | 4.3 | null | null | null |
|
CVE-2024-42024 | A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed. | [
"cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*"
]
| null | null | 9.1 | null | null |
|
CVE-2009-1464 | Multiple cross-site request forgery (CSRF) vulnerabilities in index.aas in Application Access Server (A-A-S) 2.0.48 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary programs via a command job, (2) stop services via a setservice job, or (3) terminate processes via a killprocess job. | [
"cpe:2.3:a:klinzmann:application_access_server:2.0.48:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 | null |
|
CVE-2019-15662 | An issue was discovered in Rivet Killer Control Center before 2.1.1352. IOCTL 0x120444 in KfeCo10X64.sys fails to validate an offset passed as a parameter during a memory operation, leading to an arbitrary read primitive that can be used as part of a chain to escalate privileges. | [
"cpe:2.3:a:killernetworking:killer_control_center:*:*:*:*:*:*:*:*"
]
| null | 2.7 | null | 4 | null |
|
GHSA-375g-qj2r-88m9 | in OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write. | []
| null | 4.2 | null | null | null |
|
CVE-2024-44012 | WordPress WP Newsletter Subscription plugin <= 1.1 - Local File Inclusion vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wpdev33 WP Newsletter Subscription allows PHP Local File Inclusion.This issue affects WP Newsletter Subscription: from n/a through 1.1. | []
| null | 7.5 | null | null | null |
GHSA-3jwg-934c-hf4r | MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement. | []
| null | null | null | null | null |
|
CVE-2023-36842 | Junos OS: jdhcpd will hang on receiving a specific DHCP packet |
An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause the jdhcpd to consume all the CPU cycles resulting in a Denial of Service (DoS).
On Junos OS devices with forward-snooped-client configured, if an attacker sends a specific DHCP packet to a non-configured interface, this will cause an infinite loop. The DHCP process will have to be restarted to recover the service.
This issue affects:
Juniper Networks Junos OS
* All versions earlier than 20.4R3-S9;
* 21.2 versions earlier than 21.2R3-S7;
* 21.3 versions earlier than 21.3R3-S5;
* 21.4 versions earlier than 21.4R3-S5;
* 22.1 versions earlier than 22.1R3-S4;
* 22.2 versions earlier than 22.2R3-S3;
* 22.3 versions earlier than 22.3R3-S2;
* 22.4 versions earlier than 22.4R2-S2, 22.4R3;
* 23.2 versions earlier than 23.2R2.
| [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*"
]
| null | 6.5 | null | null | null |
GHSA-c2x5-vqm4-5hj4 | Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route.This issue affects Docker Desktop: before 4.12.0. | []
| null | 9.8 | null | null | null |
|
CVE-2004-0718 | The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability. | [
"cpe:2.3:a:firebirdsql:firebird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:navigator:7.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
CVE-2024-9397 | A missing delay in directory upload UI could have made it possible for an attacker to trick a user into granting permission via clickjacking. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:129.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:129.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:129.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:129.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:129.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:129.0:beta6:*:*:*:*:*:*"
]
| null | 6.1 | null | null | null |
|
CVE-2024-34638 | Improper handling of exceptional conditions in ThemeCenter prior to SMR Sep-2024 Release 1 allows local attackers to delete non-preloaded applications. | [
"cpe:2.3:o:samsung:android:12.0:smr-sep-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*"
]
| null | 6.7 | null | null | null |
|
CVE-2023-7288 | Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'update_profile_preference' | The Paytium: Mollie payment forms & donations plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_profile_preference function in versions up to, and including, 4.3.7. This makes it possible for authenticated attackers with subscriber-level access to change plugin settings. | [
"cpe:2.3:a:paytium:paytium:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null | null |
GHSA-7gx2-3v22-76w6 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | []
| null | null | 6.5 | null | null |
|
CVE-2019-7829 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 9.3 | null |
|
CVE-2025-0886 | An incorrect permissions vulnerability was reported in Elliptic Labs Virtual Lock Sensor that could allow a local, authenticated user to escalate privileges. | []
| 8.5 | 7.8 | null | null | null |
|
CVE-2025-3176 | Project Worlds Online Lawyer Management System single_lawyer.php sql injection | A vulnerability was found in Project Worlds Online Lawyer Management System 1.0. It has been classified as critical. This affects an unknown part of the file /single_lawyer.php. The manipulation of the argument u_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-g942-j33p-3x7c | Cross-site scripting (XSS) vulnerability in header.php in PunBB 1.2.10 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly handled when the PHP_SELF variable is used to handle a pun_page tag. | []
| null | null | null | null | null |
|
RHSA-2025:2784 | Red Hat Security Advisory: grub2 security update | grub2: net: Out-of-bounds write in grub_net_search_config_file() | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
]
| null | 7.6 | null | null | null |
CVE-2021-25225 | A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [
"cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*"
]
| null | 5.5 | null | 2.1 | null |
|
GHSA-fp2v-f9gm-2jc9 | A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions. | []
| null | 7.1 | null | null | null |
|
CVE-2023-20033 | A vulnerability in Cisco IOS XE Software for Cisco Catalyst 3650 and Catalyst 3850 Series Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper resource management when processing traffic that is received on the management interface. An attacker could exploit this vulnerability by sending a high rate of traffic to the management interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. | [
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c3850-12x48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c3850-12x48u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c3850-12x48u-s:-:*:*:*:*:*:*:*"
]
| null | 8.6 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.