id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-wrg4-46g4-crg5
|
backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via a coercion of an unknown element to ANYARRAY.
|
[] | null | null | null | null |
|
CVE-2016-2016
|
Base-VxFS-50 B.05.00.01 through B.05.00.02, Base-VxFS-501 B.05.01.0 through B.05.01.03, and Base-VxFS-51 B.05.10.00 through B.05.10.02 on HPE HP-UX 11iv3 with VxFS 5.0, VxFS 5.0.1, and VxFS 5.1SP1 mishandles ACL inheritance for default:class: entries, default:other: entries, and default:user: entries, which allows local users to bypass intended access restrictions by leveraging the configuration of a parent directory.
|
[
"cpe:2.3:o:hp:hp-ux:11.11i:v3:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-50:b.05.00.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-50:b.05.00.02:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-501:b.05.01.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-501:b.05.01.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-501:b.05.01.03:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-51:b.05.10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:base-vxfs-51:b.05.10.02:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
GHSA-qr2x-466f-55hc
|
Cross-Site Request Forgery (CSRF) vulnerability in MainWP MainWP Child Reports.This issue affects MainWP Child Reports: from n/a through 2.1.1.
|
[] | null | 5.4 | null | null |
|
CVE-2019-4076
|
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157110.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.1:*:*:*:standard:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2020-9781
|
The issue was addressed by clearing website permission prompts after navigation. This issue is fixed in iOS 13.4 and iPadOS 13.4. A user may grant website permissions to a site they didn't intend to.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2021-41381
|
Payara Micro Community 5.2021.6 and below allows Directory Traversal.
|
[
"cpe:2.3:a:payara:micro_community:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 |
|
CVE-2003-0215
|
SQL injection vulnerability in bttlxeForum 2.0 beta 3 and earlier allows remote attackers to bypass authentication via the (1) username and (2) password fields, and possibly other fields.
|
[
"cpe:2.3:a:battleaxe_software:bttlxeforum:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-99cp-8r4m-63qq
|
Missing Authorization vulnerability in Noptin Newsletter Noptin allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Noptin: from n/a through 3.4.2.
|
[] | null | 5.3 | null | null |
|
GHSA-wpjw-2wcf-9m6m
|
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device. Cisco has not released software updates that address this vulnerability.
|
[] | null | 9.8 | null | null |
|
RHSA-2025:2476
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.8 | null | null |
CVE-2023-37873
|
WordPress WooCommerce Ship to Multiple Addresses Plugin <= 3.8.5 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WooCommerce Shipping Multiple Addresses plugin <= 3.8.5 versions.
|
[
"cpe:2.3:a:woocommerce:shipping_multiple_addresses:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-m245-6qxg-35cj
|
A vulnerability, which was classified as critical, has been found in itsourcecode Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /view_pdetails.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null |
|
CVE-2019-6024
|
Rakuma App for Android version 7.15.0 and earlier, and for iOS version 7.16.4 and earlier allows an attacker to bypass authentication and obtain the user's authentication information via a malicious application created by the third party.
|
[
"cpe:2.3:a:rakuten:rakuma:*:*:*:*:*:android:*:*",
"cpe:2.3:a:rakuten:rakuma:*:*:*:*:*:iphone_os:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2025-4413
|
Pixabay Images <= 3.4 - Authenticated (Author+) Arbitrary File Upload
|
The Pixabay Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the pixabay_upload function in all versions up to, and including, 3.4. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 8.8 | null | null |
GHSA-x44w-p4rq-c889
|
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0695, CVE-2019-0701.
|
[] | null | null | 6.8 | null |
|
GHSA-h9qj-3623-mvm2
|
The McAfee VirusScan Console (mcconsol.exe) in McAfee VirusScan Enterprise 8.8.0 before Hotfix 1123565 (8.8.0.1546) on Windows allows local administrators to bypass intended self-protection rules and unlock the console window by closing registry handles.
|
[] | null | null | 3 | null |
|
CVE-2013-2735
|
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
|
[
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-xmjw-8f7c-p37x
|
The Herd Effects WordPress plugin before 5.2.7 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting effects via CSRF attacks
|
[] | null | 6.1 | null | null |
|
CVE-2023-4251
|
EventPrime < 3.2.0 - Booking Creation via CSRF
|
The EventPrime WordPress plugin before 3.2.0 does not have CSRF checks when creating bookings, which could allow attackers to make logged in users create unwanted bookings via CSRF attacks.
|
[
"cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2020-20943
|
A Cross-Site Request Forgery (CSRF) in /member/post.php?job=postnew&step=post of Qibosoft v7 allows attackers to force victim users into arbitrarily publishing new articles via a crafted URL.
|
[
"cpe:2.3:a:qibosoft:qibosoft:7.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-mm7g-f2gg-cw8g
|
Kubernetes arbitrary file overwrite
|
In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.
|
[] | null | null | 5.6 | null |
CVE-2009-3446
|
SQL injection vulnerability in the MyRemote Video Gallery (com_mytube) component 1.0 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the user_id parameter in a videos action to index.php.
|
[
"cpe:2.3:a:rick_estrada:com_mytube:1.0_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-qcfp-f4pj-544f
|
In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008264.
|
[] | null | null | 7.8 | null |
|
GHSA-v6fc-3j85-22j4
|
Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Unit Trust). Supported versions that are affected are 12.0.1, 12.0.2,12.0.4,12.1.0 and 12.3.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Investor Servicing accessible data. CVSS v3.0 Base Score 5.3 (Integrity impacts).
|
[] | null | null | 5.3 | null |
|
GHSA-4xc7-h5vr-gqmj
|
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.
|
[] | null | null | null | null |
|
CVE-2023-4237
|
Platform: ec2_key module prints out the private key directly to the standard output
|
A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.
|
[
"cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_collection:*:*:*:*:*:*:*:*",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.4::el8"
] | null | 7.3 | null | null |
RHSA-2014:0469
|
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
|
rubygem-actionpack: unsafe query generation risk (incomplete fix for CVE-2013- 0155) postgresql: SET ROLE without ADMIN OPTION allows adding and removing group members postgresql: privilege escalation via procedural language validator functions postgresql: CREATE INDEX race condition possibly leading to privilege escalation postgresql: stack-based buffer overflow in datetime input/output postgresql: integer overflows leading to buffer overflows postgresql: possible buffer overflow flaws postgresql: NULL pointer dereference CFME: multiple authorization bypass vulnerabilities in CatalogController CFME: ReportController SQL injection postgresql: multiple integer overflows in hstore_io.c
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
CVE-2015-8995
|
In TrustZone an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2020-7122
|
Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the CDP (Cisco Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.1000.
|
[
"cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-5553
|
During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
|
[
"cpe:2.3:o:axis:axis_os:*:*:*:*:-:*:*:*",
"cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
"cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*"
] | null | 7.6 | null | null |
|
GHSA-qm43-fv69-q9v2
|
An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path.
|
[] | null | null | null | null |
|
CVE-2011-1624
|
Cisco IOS 12.2(58)SE, when a login banner is configured, allows remote attackers to cause a denial of service (device reload) by establishing two SSH2 sessions, aka Bug ID CSCto62631.
|
[
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2016-15017
|
fabarea media_upload UploadFileService.php getUploadedFileList pathname traversal
|
A vulnerability has been found in fabarea media_upload on TYPO3 and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The patch is identified as b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:ecodev:media_upload:*:*:*:*:*:typo3:*:*"
] | null | 5.5 | 5.5 | 5.2 |
GHSA-gg55-qc78-2v7c
|
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration.
|
[] | null | null | null | null |
|
GHSA-7mrh-jrcg-wc76
|
By sending specific queries to the resolver, an attacker can cause named to crash.
|
[] | null | 7.5 | null | null |
|
CVE-2022-42078
|
Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.
|
[
"cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23_multi_td01:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2018-16626
|
index.php/Admin/Classes in Typesetter 5.1 allows XSS via the description of a new class name.
|
[
"cpe:2.3:a:typesettercms:typesetter:5.1:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2022-23448
|
A vulnerability has been identified in SIMATIC Energy Manager Basic (All versions < V7.3 Update 1), SIMATIC Energy Manager PRO (All versions < V7.3 Update 1). Affected applications improperly assign permissions to critical directories and files used by the application processes. This could allow a local unprivileged attacker to achieve code execution with ADMINISTRATOR or even NT AUTHORITY/SYSTEM privileges.
|
[
"cpe:2.3:a:siemens:simatic_energy_manager_basic:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_energy_manager_basic:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_energy_manager_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_energy_manager_pro:7.3:-:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-xmf3-54fg-fhvv
|
Cross site Scripting (XSS) vulnerability in MERCUSYS Mercury X18G 1.0.5 devices, via crafted values to the 'src_dport_start', 'src_dport_end', and 'dest_port' parameters.
|
[] | null | null | null | null |
|
GHSA-q5c9-9c6m-cvqq
|
Amzetta zPortal Windows zClient is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
|
[] | null | null | null | null |
|
GHSA-7qx8-r7m7-p473
|
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
|
[] | null | null | null | null |
|
CVE-2008-1152
|
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
|
[
"cpe:2.3:o:cisco:cisco_ios:12.0:da:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:db:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:dc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:sc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:sl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:sp:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:st:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:sx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:sz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:t:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:wc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:wt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xm:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xn:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xo:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xs:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xv:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.0:xw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:aa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ax:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:az:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:b:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:c:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:cx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:d:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:da:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:db:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:dc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ea:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:eb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ec:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:eo:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:eu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ew:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ex:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ey:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ez:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ga:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:gb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xm:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xp:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xs:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xv:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:xz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ya:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:ye:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.1:yj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:b:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:bc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:bw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:by:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:bz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:cx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:cy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:da:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:dd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:dx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:eu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ew:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ex:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ey:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ez:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:fz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ixa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ixb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ixc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ixd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ja:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:mb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:mc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:s:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sbc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:se:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sea:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:seb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sec:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sed:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:see:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sef:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:seg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sm:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:so:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:st:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:su:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sv:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sxa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:sz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:t:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:tpc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:uz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xm:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xn:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xs:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xv:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:xw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ya:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ye:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ym:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yn:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yo:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yp:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ys:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yv:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:yy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:za:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:ze:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zp:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xm:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xn:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xv:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2019-13603
|
An issue was discovered in the HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader Windows Biometric Framework driver 5.0.0.5. It has a statically coded initialization vector to encrypt a user's fingerprint image, resulting in weak encryption of that. This, in combination with retrieving an encrypted fingerprint image and encryption key (through another vulnerability), allows an attacker to obtain a user's fingerprint image.
|
[
"cpe:2.3:o:hidglobal:digital_persona_u.are.u_4500_driver_firmware:5.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:hidglobal:digital_persona_u.are.u_4500:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
GHSA-j9ch-j53g-49hj
|
Blind Server-Side Request Forgery (SSRF) vulnerability in karlomikus Bar Assistant before version 3.2.0 does not validate a parameter before making a request through Image::make(), which could allow authenticated remote attackers to execute arbitrary code.
|
[] | null | 8.8 | null | null |
|
CVE-2024-33057
|
Buffer Over-read in WLAN Host Communication
|
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
|
[
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6777aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6787aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:flight_rb5_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_214_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_316_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_316:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_318_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_318:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_3210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_3210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_326:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6777aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6787aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:robotics_rb5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8530p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:vision_intelligence_400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-v5cj-r6r2-695v
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
|
[] | null | null | null | null |
|
CVE-2010-1667
|
Multiple cross-site scripting (XSS) vulnerabilities in Mahara before 1.0.15, 1.1.x before 1.1.9, and 1.2.x before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-25785
|
WordPress WP Post Rating plugin <= 2.5 - Vote Manipulation Vulnerability
|
Missing Authorization vulnerability in Shoaib Saleem WP Post Rating allows Functionality Misuse.This issue affects WP Post Rating: from n/a through 2.5.
|
[
"cpe:2.3:a:shoaibsaleem:wp_post_rating:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2024-36014
|
drm/arm/malidp: fix a possible null pointer dereference
|
In the Linux kernel, the following vulnerability has been resolved:
drm/arm/malidp: fix a possible null pointer dereference
In malidp_mw_connector_reset, new memory is allocated with kzalloc, but
no check is performed. In order to prevent null pointer dereferencing,
ensure that mw_state is checked before calling
__drm_atomic_helper_connector_reset.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
RHSA-2012:1301
|
Red Hat Security Advisory: JBoss Enterprise Data Services Platform 5.3.0 update
|
Teiid: JDBC socket does not encrypt client login messages by default
|
[
"cpe:/a:redhat:jboss_enterprise_data_services:5.3"
] | null | null | null | null |
GHSA-x97m-9ccg-7rgv
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | null | null |
|
GHSA-2v4h-4vvv-j9ph
|
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift JDBC Driver 1.2.40 through 1.2.55 may allow a local user to execute code. NOTE: this is different from CVE-2022-29972.
|
[] | null | 7.8 | null | null |
|
CVE-2020-27035
|
In priorLinearAllocation of C2AllocatorIon.cpp, there is a possible use-after-free due to improper locking. This could lead to local information disclosure in the media codec with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-152239213
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-gv69-7q7f-c8fh
|
Fuji Electric Alpha5 SMARTis vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
|
[] | 8.5 | 7.8 | null | null |
|
GHSA-g6vw-2xh7-mv9p
|
Cross-site scripting (XSS) vulnerability in index.php in ezPortal/ztml CMS 1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) about, (2) again, (3) lastname, (4) email, (5) password, (6) album, (7) id, (8) table, (9) desc, (10) doc, (11) mname, (12) max, (13) htpl, (14) pheader, and possibly other parameters.
|
[] | null | null | null | null |
|
CVE-2006-6267
|
PostNuke 0.7.5.0, and certain minor versions, allows remote attackers to obtain sensitive information via a non-numeric value of the stop parameter, which reveals the path in an error message.
|
[
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.7.5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2023-24155
|
TOTOLINK T8 V4.1.5cu was discovered to contain a hard code password for the telnet service which is stored in the component /web_cste/cgi-bin/product.ini.
|
[
"cpe:2.3:o:totolink:t8_firmware:v4.1.5cu:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-hf2f-hm5p-pq8f
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashish Ajani Contact Form vCard Generator allows Reflected XSS. This issue affects Contact Form vCard Generator: from n/a through 2.4.
|
[] | null | 7.1 | null | null |
|
CVE-2012-6579
|
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.
|
[
"cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-hqq7-2q2v-82xq
|
Cross-site Scripting in sanitize-url
|
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
|
[] | null | 5.4 | null | null |
GHSA-7rq5-xwr8-9379
|
Cross-Site Request Forgery (CSRF) vulnerability in FuturioWP Futurio Extra plugin <= 1.8.4 versions leads to activation of arbitrary plugin.
|
[] | null | 6.5 | null | null |
|
GHSA-vhr7-c3p5-qrf4
|
An issue in Qimou CMS v.3.34.0 allows a remote attacker to execute arbitrary code via the upgrade.php component.
|
[] | null | 9.8 | null | null |
|
GHSA-q693-v7qf-p4xj
|
Alkacon OpenCMS CSV Injection via New User module
|
Alkacon OpenCMS v10.5.4 and before is affected by CSV (aka Excel Macro) Injection in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp) via the First Name or Last Name.
|
[] | null | null | 7.8 | null |
CVE-2018-12501
|
Nagios Fusion before 4.1.4 has XSS, aka TPS#13332-13335.
|
[
"cpe:2.3:a:nagios:fusion:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-fmf9-8vg2-mj5m
|
A vulnerability classified as problematic has been found in MHA Sistemas arMHAzena 9.6.0.0. This affects an unknown part of the component Cadastro Page. The manipulation of the argument Query leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256887. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 3.5 | null | null |
|
RHSA-2011:1803
|
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.2 update
|
extension): MITM due to improper validation of AX attribute signatures
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5"
] | null | null | null | null |
CVE-2024-20296
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit this vulnerability, an attacker would need at least valid Policy Admin credentials on the affected device.
This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.
|
[
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:3.3.0:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
CVE-2020-10575
|
An issue was discovered in Janus through 0.9.1. plugins/janus_videocall.c in the VideoCall plugin mishandles session management because a race condition causes some references to be freed too early or too many times.
|
[
"cpe:2.3:a:meetecho:janus:*:*:*:*:*:*:*:*"
] | null | 4.2 | null | 4 |
|
GHSA-7995-jw5x-6779
|
The Accessibility services in Android 7.0 before 2016-10-01 mishandle motion events, which allows attackers to conduct touchjacking attacks and consequently gain privileges via a crafted application, aka internal bug 30647115.
|
[] | null | null | 5.5 | null |
|
GHSA-9986-82cc-2wr8
|
CSRF exists in Webmin 1.850. By sending a GET request to at/create_job.cgi containing dir=/&cmd= in the URI, an attacker to execute arbitrary commands.
|
[] | null | null | 8.8 | null |
|
ICSA-23-320-03
|
Siemens Desigo CC product family
|
A buffer over-read vulnerability in the CodeMeter Runtime network server could cause the server to return packets containing data from the heap.
An unauthenticated remote attacker could exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server (i.e., CodeMeter.exe). A buffer over-read vulnerability in the HTTP(S) service of the CodeMeter Runtime CmWAN server could cause the server to crash.
An unauthenticated remote attacker with access to the CmWAN port could exploit this issue to crash the CodeMeter Runtime Server (i.e., CodeMeter.exe). In CodeMeter Runtime versions up to 7.60b, there is a heap buffer overflow vulnerability which can potentially lead to a remote code execution. Currently, no PoC is known to us. To
exploit the heap overflow, additional protection mechanisms need to be broken. Remote access is only possible if CodeMeter is configured as a server. If CodeMeter is not configured as a server, the adversary would need to log in to the machine where the CodeMeter Runtime is running or trick the user into sending a malicious request to CodeMeter. This might result in an escalation of privilege. (WIBU-230704-01)
|
[] | null | 9 | null | null |
GHSA-2f5w-wx6g-q5g3
|
useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.
|
[] | null | null | null | null |
|
CVE-2021-0963
|
In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.3 |
|
ICSA-22-069-07
|
Siemens Climatix POL909
|
The Group Management page of affected devices is vulnerable to cross-site scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action. The User Management page of affected devices is vulnerable to cross-site scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action. The handling of log files in the web application of affected devices contains an information disclosure vulnerability which could allow logged in users to access sensitive files.
|
[] | null | 4.3 | null | null |
CVE-2013-0120
|
The web interface on Dell PowerConnect 6248P switches allows remote attackers to cause a denial of service (device crash) via a malformed request.
|
[
"cpe:2.3:h:dell:powerconnect_6248p:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-v4q3-4wc9-gf9f
|
An external config control vulnerability exists in the OAS Engine SecureAddUser functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of an OAS user account. An attacker can send a sequence of requests to trigger this vulnerability.
|
[] | null | 7.5 | null | null |
|
CVE-2025-22754
|
WordPress Amber Plugin <=1.4.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berkman Center for Internet & Society Amber allows Reflected XSS.This issue affects Amber: from n/a through 1.4.4.
|
[] | null | 7.1 | null | null |
CVE-2017-5192
|
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
|
[
"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.2:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-2024-20277
|
A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.
|
[
"cpe:2.3:a:cisco:thousandeyes_enterprise_agent:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
CVE-2020-35862
|
An issue was discovered in the bitvec crate before 0.17.4 for Rust. BitVec to BitBox conversion leads to a use-after-free or double free.
|
[
"cpe:2.3:a:bitvec_project:bitvec:*:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-4m3c-5mq3-5qxq
|
libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections).
|
[] | null | null | null | null |
|
GHSA-3g62-98rr-25fp
|
AROX School-ERP Pro has a command execution vulnerability. import_stud.php and upload_fille.php do not have session control. Therefore an unauthenticated user can execute a command on the system.
|
[] | null | null | 9.8 | null |
|
CVE-2006-5138
|
Groupee UBB.threads 6.5.1.1 allows remote attackers to obtain sensitive information via a direct request for cron/php/subscriptions.php, which reveals the path in an error message.
|
[
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-wx5w-92m5-qp68
|
The Awesome buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's btn2 shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
RHSA-2012:0407
|
Red Hat Security Advisory: libpng security update
|
libpng: buffer overflow in png_inflate caused by invalid type conversions
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:4990
|
Red Hat Security Advisory: kernel security update
|
kernel: net: bluetooth: information leak when processing certain AMP packets
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5.3 | null | null |
GHSA-fmfg-pggg-vmwc
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wpsoul GreenCon allows Stored XSS.This issue affects GreenCon: from n/a through 1.0.1.
|
[] | null | 6.5 | null | null |
|
GHSA-h267-xjjf-qgxq
|
SQL Injection in GitHub repository instantsoft/icms2 prior to 2.16.1-git.
|
[] | null | null | 9.8 | null |
|
GHSA-j6f9-9c8r-xfpr
|
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
|
[] | null | null | null | null |
|
GHSA-j6vm-3wj6-fwrh
|
An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127.
|
[] | null | 7.5 | null | null |
|
CVE-2018-9446
|
In smp_br_state_machine_event of smp_br_main.cc, there is a possible out of bounds write due to memory corruption. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-80145946.
|
[
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
RHSA-2022:1891
|
Red Hat Security Advisory: libpq security update
|
postgresql: libpq processes unencrypted bytes from man-in-the-middle
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.7 | null | null |
GHSA-6v8p-vh6x-pghw
|
Unrestricted Upload of File with Dangerous Type vulnerability in Pk Favicon Manager.This issue affects Pk Favicon Manager: from n/a through 2.1.
|
[] | null | 9.1 | null | null |
|
CVE-2024-0465
|
code-projects Employee Profile Management System download.php path traversal
|
A vulnerability classified as problematic was found in code-projects Employee Profile Management System 1.0. This vulnerability affects unknown code of the file download.php. The manipulation of the argument download_file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-250570 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:code-projects:employee_profile_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 2.7 |
CVE-2021-25443
|
A use after free vulnerability in conn_gadget driver prior to SMR AUG-2021 Release 1 allows malicious action by an attacker.
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 4.6 |
|
CVE-2023-50828
|
WordPress Ultimate Dashboard Plugin <= 3.7.11 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Vongries Ultimate Dashboard – Custom WordPress Dashboard allows Stored XSS.This issue affects Ultimate Dashboard – Custom WordPress Dashboard: from n/a through 3.7.11.
|
[
"cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2022-29220
|
No verification of commits origin in github-action-merge-dependabot
|
github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the PR is created by dependabot and if their own action has enough permissions to modify the PR in the pipeline. If so, they can modify the PR by adding a second seemingly valid and legit commit to the PR, as they can set arbitrarily the username and email in for commits in git. Because the bot only checks if the actor is valid, it would pass the malicious changes through and merge the PR automatically, without getting noticed by project maintainers. It would probably not be possible to determine where the malicious commit came from, as it would only say `dependabot[bot]` and the corresponding email-address. Version 3.2.0 contains a patch for this issue.
|
[
"cpe:2.3:a:fastify:github_action_merge_dependabot:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2019-15229
|
FUEL CMS 1.4.4 has CSRF in the blocks/create/ Create Blocks section of the Admin console. This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.
|
[
"cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
PYSEC-2019-165
| null |
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
|
[] | null | null | null | null |
GHSA-38x8-c543-7468
|
SQL injection vulnerability in browse_items.asp in WebCortex WebStores 2000 6.0 allows remote attackers to gain unauthorized access and execute arbitrary commands via the Search_Text parameter.
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.