id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-94cx-8qx3-6fv7
|
LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in functions.internal.build.inc.php via the parameter p_dt_s_d.
|
[] | null | null | null | null | null |
|
CVE-2020-7283
|
Privilege Escalation vulnerability in McAfee Total Protection (MTP)
|
Privilege Escalation vulnerability in McAfee Total Protection (MTP) before 16.0.R26 allows local users to create and edit files via symbolic link manipulation in a location they would otherwise not have access to. This is achieved through running a malicious script or program on the target machine.
|
[
"cpe:2.3:a:mcafee:total_protection:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-q9f5-mqv7-56mh
|
A improper validation of certificate with host mismatch in Fortinet FortiTokenAndroid version 5.0.3 and below, Fortinet FortiTokeniOS version 5.2.0 and below, Fortinet FortiTokenWinApp version 4.0.3 and below allows attacker to retrieve information disclosed via man-in-the-middle attacks.
|
[] | null | 5.4 | null | null | null |
|
CVE-2023-33829
|
A stored cross-site scripting (XSS) vulnerability in Cloudogu GmbH SCM Manager v1.2 to v1.60 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field.
|
[
"cpe:2.3:a:cloudogu:scm_manager:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
RHSA-2022:1724
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | 7.5 | null | null |
CVE-2021-23850
|
Buffer Overflow vulnerability in the recovery image telnet server
|
A specially crafted TCP/IP packet may cause a camera recovery image telnet interface to crash. It may also cause a buffer overflow which could enable remote code execution. The recovery image can only be booted with administrative rights or with physical access to the camera and allows the upload of a new firmware in case of a damaged firmware.
|
[
"cpe:2.3:o:bosch:autodome_ip_4000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_4000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_ip_5000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_5000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_ip_starlight_5000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_starlight_5000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_ip_starlight_7000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_starlight_7000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_3000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_3000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_bullet_4000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_bullet_4000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_bullet_5000_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_bullet_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_bullet_5000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_bullet_5000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_bullet_6000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_bullet_6000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_3000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_3000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_4000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_4000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_5000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_5000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_starlight_5000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_starlight_5000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_starlight_8000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_starlight_8000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:mic_ip_starlight_7000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:mic_ip_starlight_7000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:mic_ip_starlight_7100i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:mic_ip_starlight_7100i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:mic_ip_ultra_7100i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:mic_ip_ultra_7100i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:mic_ip_fusion_9000i_firmware:cpp7.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:mic_ip_fusion_9000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_starlight_6000_firmware:cpp7:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_starlight_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_starlight_7000_firmware:cpp7:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_starlight_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_thermal_8000_firmware:cpp7:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_thermal_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_starlight_6000_firmware:cpp7:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_starlight_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_starlight_7000_firmware:cpp7:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_starlight_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_thermal_9000_rm_firmware:cpp7:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_thermal_9000_rm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:aviotec_ip_starlight_8000_firmware:cpp6:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:aviotec_ip_starlight_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_starlight_8000_firmware:cpp6:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_starlight_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_ultra_8000_firmware:cpp6:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_ultra_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_panoramic_6000_firmware:cpp6:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_panoramic_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_panoramic_7000_firmware:cpp6:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_panoramic_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_ip_4000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_4000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_ip_5000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_5000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_ip_5000_ir_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_ip_5000_ir:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:autodome_7000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:autodome_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_hd_1080p_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_hd_1080p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_hd_1080p_hdr_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_hd_1080p_hdr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_hd_720p_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_hd_720p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_imager_9000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_imager_9000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_bullet_4000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_bullet_4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_bullet_5000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_4000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_4000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_5000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_5000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_5000_mp_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_5000_mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dinion_ip_starlight_7000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dinion_ip_starlight_7000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_corner_9000_mp_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_corner_9000_mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_hd_1080p_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_hd_1080p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_hd_1080p_hdr_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_hd_1080p_hdr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_hd_720p_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_hd_720p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:vandal-proof_flexidome_hd_1080p_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:vandal-proof_flexidome_hd_1080p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:vandal-proof_flexidome_hd_1080p_hdr_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:vandal-proof_flexidome_hd_1080p_hdr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:vandal-proof_flexidome_hd_720p_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:vandal-proof_flexidome_hd_720p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_micro_2000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_micro_2000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_micro_2000_ip_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_micro_2000_ip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_indoor_4000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_indoor_4000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_indoor_4000_ir_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_indoor_4000_ir:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_outdoor_4000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_outdoor_4000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_outdoor_4000_ir_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_outdoor_4000_ir:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_indoor_5000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_indoor_5000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_indoor_5000_mp_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_indoor_5000_mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_micro_5000_mp_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_micro_5000_mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_outdoor_5000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_outdoor_5000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_outdoor_5000_mp_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_outdoor_5000_mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:flexidome_ip_panoramic_5000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:flexidome_ip_panoramic_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:ip_bullet_4000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:ip_bullet_4000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:ip_bullet_5000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:ip_bullet_5000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:ip_micro_2000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:ip_micro_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:ip_micro_2000_hd_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:ip_micro_2000_hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:mic_ip_dynamic_7000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:mic_ip_dynamic_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:mic_ip_starlight_7000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:mic_ip_starlight_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:tinyon_ip_2000_firmware:cpp4:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:tinyon_ip_2000:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
GHSA-7627-2wxq-jrmh
|
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
|
[] | null | 7 | null | null | null |
|
GHSA-gvgf-pvh5-vjh4
|
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures to view and edit low-sensitivity information. Exploitation of this issue does not require user interaction.
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-3537
|
Tutorials-Website Employee Management System update-user.php improper authorization
|
A vulnerability was found in Tutorials-Website Employee Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/update-user.php. The manipulation of the argument ID leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.9 | 5.3 | 5.3 | 5 | null |
CVE-2000-0197
|
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
|
[
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2014-4432
|
fdesetup in Apple OS X before 10.10 does not properly display the encryption status in between a setting-update action and a reboot action, which might make it easier for physically proximate attackers to obtain cleartext data by leveraging ignorance of the reboot requirement.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 4.7 | null |
|
GHSA-rh54-h682-292g
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPXPO PostX allows DOM-Based XSS. This issue affects PostX: from n/a through 4.1.25.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-47196
|
A vulnerability has been identified in ModelSim (All versions < V2025.2), Questa (All versions < V2025.2). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.
|
[
"cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:*"
] | 5.4 | 6.7 | null | null | null |
|
GHSA-g3cr-xghh-g27v
|
Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
|
[] | null | null | 9.8 | null | null |
|
CVE-2018-21091
|
An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. Telecom has a System Crash via abnormal exception handling. The Samsung ID is SVE-2017-10906 (January 2018).
|
[
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
CVE-2024-7328
|
YouDianCMS information disclosure
|
A vulnerability, which was classified as problematic, has been found in YouDianCMS 7. This issue affects some unknown processing of the file /t.php?action=phpinfo. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273251. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:youdiancms:youdiancms:6.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:youdiancms:youdiancms:7.0:*:*:*:*:*:*:*"
] | 6.9 | 5.3 | 5.3 | 5 | null |
GHSA-qqhv-wg8r-6hp4
|
Unspecified vulnerability in Cisco IOS 12.2SRE before 12.2(33)SRE4, 15.0, and 15.1, and IOS XE 2.1.x through 3.3.x, when an MPLS domain is configured, allows remote attackers to cause a denial of service (device crash) via a crafted IPv6 packet, related to an expired MPLS TTL, aka Bug ID CSCto07919.
|
[] | null | null | null | null | null |
|
CVE-2025-2563
|
User Registration & Membership < 4.1.2- Unauthenticated Privilege Escalation
|
The User Registration & Membership WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges
|
[] | null | 8.1 | null | null | null |
GHSA-95ch-f6qf-fhcv
|
A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin_class.php. The manipulation of the argument img leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255588.
|
[] | null | 6.3 | null | null | null |
|
RHSA-2018:2613
|
Red Hat Security Advisory: samba security, bug fix and enhancement update
|
samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient
|
[
"cpe:/a:redhat:storage:3.4:samba:el7"
] | null | null | 4.3 | null | null |
CVE-2025-25568
|
SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. NOTE: the Supplier disputes this because the use-after-free is not in the VPN software, but is instead in a separate tool that has no untrusted input and runs under the user's own privileges (it is a stress-testing tool for a networking stack).
|
[] | null | 9.8 | null | null | null |
|
GHSA-x43j-vqrc-93c4
|
vars.php in WordPress 2.0.2, possibly when running on Mac OS X, allows remote attackers to spoof their IP address via a PC_REMOTE_ADDR HTTP header, which vars.php uses to redefine $_SERVER['REMOTE_ADDR'].
|
[] | null | null | null | null | null |
|
CVE-2023-4870
|
SourceCodester Contact Manager App Contact Information index.php cross site scripting
|
A vulnerability classified as problematic has been found in SourceCodester Contact Manager App 1.0. This affects an unknown part of the file index.php of the component Contact Information Handler. The manipulation of the argument contactID with the input "><sCrIpT>alert(1)</ScRiPt> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239355.
|
[
"cpe:2.3:a:contact_manager_app_project:contact_manager_app:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
RHSA-2013:1028
|
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update
|
apache-cxf: XML encryption backwards compatibility attacks rubygem-json: Denial of Service and SQL Injection ruby: entity expansion DoS vulnerability in REXML apache-cxf: Multiple denial of service flaws in the StAX parser
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
] | null | null | null | null | null |
GHSA-3w3m-pj5j-mqxp
|
A Denial-of-Service (DoS) vulnerability was discovered in the fsicapd component used in WithSecure products whereby the service may crash while parsing the scanning request.
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-26533
|
SQL injection risk in course search module list filter
|
An SQL injection risk was identified in the module list filter within course search.
|
[] | null | 8.1 | null | null | null |
GHSA-x75x-89gj-wfcm
|
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
|
[] | null | null | null | null | null |
|
CVE-2025-53821
|
WeGIA vulnerable to Open Redirect in endpoint 'control.php' parameter 'nextPage'
|
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. An Open Redirect vulnerability exists in the web application prior to version 3.4.5. The control.php endpoint allows to specify an arbitrary URL via the `nextPage` parameter, leading to an uncontrolled redirection. Version 3.4.5 contains a fix for the issue.
|
[] | null | 4.7 | null | null | null |
GHSA-m929-4xg6-9c8m
|
Directory traversal vulnerability in pkgadd in SCO UnixWare 7.1.4 before p534589 allows local users to create or append to arbitrary files via ".." sequences in an unspecified environment variable, probably PKGINST.
|
[] | null | null | null | null | null |
|
CVE-2022-30209
|
Windows IIS Server Elevation of Privilege Vulnerability
|
Windows IIS Server Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
GHSA-w9gm-4cg6-rj9v
|
The WebGL implementation in Google Chrome before 9.0.597.107 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, aka Issue 71960.
|
[] | null | null | null | null | null |
|
CVE-2021-22329
|
There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.
|
[
"cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
CVE-2019-0117
|
Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700__firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | 2.1 | null |
|
CVE-2017-11719
|
The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-r66m-9f9x-jv46
|
An issue has been discovered in GitLab CE/EE affecting all versions from 8.7 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2. Improper input validation in Tokens Names could be used to trigger a denial of service.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2022:1162
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.8 bug fix and security update
|
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8.2 | null | null | null |
CVE-2017-12309
|
A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. An exploit could allow the attacker to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. Cisco Bug IDs: CSCvf16705.
|
[
"cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.2-020:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:11.0.0-105:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-3gj4-2qc3-888r
|
Windows Telephony Server Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2018-13911
|
Out of bounds memory read and access may lead to unexpected behavior in GNSS XTRA Parser in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130
|
[
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-h4j5-6mr2-mxqf
|
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) file names to apps/user_ldap/settings.php; (2) url or (3) title parameter to apps/bookmarks/ajax/editBookmark.php; (4) tag or (5) page parameter to apps/bookmarks/ajax/updateList.php; (6) identity to apps/user_openid/settings.php; (7) stack name in apps/gallery/lib/tiles.php; (8) root parameter to apps/gallery/templates/index.php; (9) calendar displayname in apps/calendar/templates/part.import.php; (10) calendar uri in apps/calendar/templates/part.choosecalendar.rowfields.php; (11) title, (12) location, or (13) description parameter in apps/calendar/lib/object.php; (14) certain vectors in core/js/multiselect.js; or (15) artist, (16) album, or (17) title comments parameter in apps/media/lib_scanner.php.
|
[] | null | null | null | null | null |
|
CVE-2024-20373
|
Cisco IOS and Cisco IOS XE SNMP Extended ACL Bypass Vulnerability
|
A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.
This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.
SNMP with IPv6 ACL configurations is not affected.
For more information, see the section of this advisory.
|
[
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.9.3:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-4fh2-8qx6-rh23
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for WooCommerce and Zoho CRM, Books, Invoice, Inventory, Bigin.This issue affects Integration for WooCommerce and Zoho CRM, Books, Invoice, Inventory, Bigin: from n/a before 1.3.7.
|
[] | null | 4.7 | null | null | null |
|
CVE-2025-27779
|
Applio allows unsafe deserialization in model_blender.py
|
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `model_blender.py` lines 20 and 21. `model_fusion_a` and `model_fusion_b` from voice_blender.py take user-supplied input (e.g. a path to a model) and pass that value to the `run_model_blender_script` and later to `model_blender` function, which loads these two models with `torch.load` in `model_blender.py (on lines 20-21 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available on the `main` branch of the Applio repository.
|
[] | 8.9 | null | null | null | null |
CVE-2017-12629
|
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
|
[
"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2022-38673
|
In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-gc3f-r2gj-mhrp
|
A vulnerability was found in SourceCodester Best House Rental Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?page=tenants of the component Manage Tenant Details. The manipulation of the argument Last Name/First Name/Middle Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only shows the field "Last Name" to be affected. Other fields might be affected as well.
|
[] | 5.3 | 3.5 | null | null | null |
|
CVE-2024-46550
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the CGIbyFieldName parameter at chglog.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[
"cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-h9qm-fw5r-9vmm
|
A vulnerability in the user registration component found in the ~/src/Classes/RegistrationAuth.php file of the ProfilePress WordPress plugin made it possible for users to register on sites as an administrator. This issue affects versions 3.0.0 - 3.1.3. .
|
[] | null | 9.8 | null | null | null |
|
CVE-2018-1144
|
A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi.
|
[
"cpe:2.3:o:belkin:n750_firmware:1.10.22:*:*:*:*:*:*:*",
"cpe:2.3:h:belkin:n750:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2017-10699
|
avcodec 2.2.x, as used in VideoLAN VLC media player 2.2.7-x before 2017-06-29, allows out-of-bounds heap memory write due to calling memcpy() with a wrong size, leading to a denial of service (application crash) or possibly code execution.
|
[
"cpe:2.3:a:videolan:vlc_media_player:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.7:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-r9p4-2pvr-hr3h
|
Stack-based buffer overflow in Pirate Radio Destiny Media Player 1.61 allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.
|
[] | null | null | null | null | null |
|
GHSA-qgvw-qc2q-gv5q
|
Django Tastypie Improper Deserialization of YAML Data
|
The `from_yaml` method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.
|
[] | 9.3 | 9.8 | null | null | null |
CVE-2022-43588
|
A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.
|
[
"cpe:2.3:a:callback:cbfs_filter:20.0.8317:*:*:*:*:*:*:*"
] | null | null | 6.2 | null | null |
|
GHSA-543r-2767-7774
|
Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
|
[] | null | null | null | null | null |
|
CVE-2019-8728
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, Safari 13, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-cvvq-mv3v-83x2
|
Multiple cross-site scripting (XSS) vulnerabilities in the contacts application in ownCloud Server Community Edition before 5.0.19, 6.x before 6.0.7, and 7.x before 7.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a crafted contact.
|
[] | null | null | null | null | null |
|
CVE-2015-2852
|
Cross-site request forgery (CSRF) vulnerability in the WebUI component in Blue Coat SSL Visibility Appliance SV800, SV1800, SV2800, and SV3800 3.6.x through 3.8.x before 3.8.4 allows remote attackers to hijack the authentication of administrators.
|
[
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv2800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv2800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv3800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv3800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv800:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gg4p-8wfq-mx57
|
IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system.
|
[] | null | 3.3 | null | null | null |
|
CVE-2021-42057
|
Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases.
|
[
"cpe:2.3:a:obsidian:obsidian_dataview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:obsidian:obsidian_dataview:0.4.12:-:*:*:*:*:*:*",
"cpe:2.3:a:obsidian:obsidian_dataview:0.4.12:hotfix1:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-v3h2-4j2r-wqj8
|
Ignite Realtime Openfire Server has Cross-site Scripting vulnerability in admin console
|
The Admin Console in Ignite Realtime Openfire Server before 4.1.7 allows arbitrary client-side JavaScript code execution on victims who click a crafted setup/setup-host-settings.jsp?domain= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application.
|
[] | null | null | 4.8 | null | null |
CVE-2001-1177
|
ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[
"cpe:2.3:a:samsung:ml-85g_gdi_printer_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:samsung:ml-85p_printer_driver:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
CVE-2024-9416
|
Modula Image Gallery <= 2.10.1 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via FancyBox 5 JavaScript Library
|
The Modula Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions <= 5.0.36) due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2024-12054
|
ZF Roll Stability Support Plus (RSSPlus) Authentication Bypass By Primary Weakness
|
ZF Roll Stability Support Plus (RSSPlus)
is vulnerable to an authentication bypass vulnerability targeting
deterministic RSSPlus SecurityAccess service seeds, which may allow an
attacker to remotely (proximal/adjacent with RF equipment or via pivot
from J2497 telematics devices) call diagnostic functions intended for
workshop or repair scenarios. This can impact system availability,
potentially degrading performance or erasing software, however the
vehicle remains in a safe vehicle state.
|
[] | 5.9 | 5.4 | null | null | null |
CVE-2014-9310
|
Cross-site scripting (XSS) vulnerability in the WordPress Backup to Dropbox plugin before 4.1 for WordPress.
|
[
"cpe:2.3:a:wordpress_backup_to_dropbox_project:wordpress_backup_to_dropbox:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-hv5v-h4qh-vgxj
|
Buffer overflow in the find_default_type function in libsecure in NSA Security-enhanced Linux, which may allow attackers to modify critical data in memory.
|
[] | null | null | null | null | null |
|
CVE-2007-3547
|
Directory traversal vulnerability in qti_checkname.php in QuickTicket 1.2 allows remote attackers to include and execute arbitrary local files a .. (dot dot) in the lang parameter.
|
[
"cpe:2.3:a:qt-cute:quickticket:1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2019-7868
|
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with permissions to manage tax rules.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2018-7907
|
Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.
|
[
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c100b257custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c170b253custc170d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c199b251custc199d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c229b003custc229d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:agassi-l09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c100b257custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c128b252custc128d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c170b252custc170d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c229b251custc229d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c331b003custc331d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c794b001custc794d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:agassi-w09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c100b160custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c170b160custc170d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c199b162custc199d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c209b160custc209d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c333b160custc333d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:baggio2-u01a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-al00c_firmware:bond-al00cc00b201:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-al00c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-al10b_firmware:bond-al10bc00b201:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-al10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-tl10b_firmware:bond-tl10bc01b201:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-tl10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-tl10c_firmware:bond-tl10cc01b131:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-tl10c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:haydn-l1jb_firmware:hdn-l1jc137b068:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:haydn-l1jb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c100b252custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c209b002custc209d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c362b001custc362d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:kobe-l09a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09ahn_firmware:kob-l09c233b226:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:kobe-l09ahn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-w09c_firmware:kob-w09c128b251custc128d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:kobe-w09c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:lelandp-l22c_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:lelandp-l22d_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rhone-al00_firmware:rhone-al00c00b186:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:selina-l02_firmware:selina-l02c432b153:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:selina-l02:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:stanford-l09s_firmware:stanford-l09sc432b183:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:toronto-al00_firmware:toronto-al00c00b223:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:toronto-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:toronto-al00a_firmware:toronto-al00ac00b223:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:toronto-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:toronto-tl10_firmware:toronto-tl10c01b223:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:toronto-tl10:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2019-0162
|
Memory access in virtual memory mapping for some microprocessors may allow an authenticated user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:h:intel:-:-:*:*:*:*:*:*:*"
] | null | null | 3.8 | 2.1 | null |
|
CVE-2018-17314
|
On the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.
|
[
"cpe:2.3:o:ricoh:mp_305\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_305\\+:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2006-6769
|
Multiple cross-site scripting (XSS) vulnerabilities in PHP Live! 3.2.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) search_string parameter in (a) setup/transcripts.php, the (2) l parameter in (b) index.php, the (3) login field in (c) phplive/index.php, and the (4) deptid and (5) x parameters in (d) phplive/message_box.php.
|
[
"cpe:2.3:a:php_live:php_live:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php_live:php_live:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php_live:php_live:3.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-r596-hj6g-g56c
|
Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
|
[] | null | 8.8 | null | null | null |
|
GHSA-7fgm-h923-mw4g
|
The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression.
|
[] | null | 5.5 | null | null | null |
|
GHSA-rg26-fqc8-rw9j
|
Cross-site scripting (XSS) vulnerability in content blocking in SonicWALL SOHO3 6.3.0.0 allows remote attackers to inject arbitrary web script or HTML via a blocked URL.
|
[] | null | null | null | null | null |
|
CVE-2022-45909
|
drachtio-server before 0.8.19 has a heap-based buffer over-read via a long Request-URI in an INVITE request.
|
[
"cpe:2.3:a:drachtio:drachtio-server:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
GHSA-jx5j-prpx-hpfh
|
SQL injection vulnerability in index.php in the mosDirectory (com_directory) 2.3.2 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a viewcat action.
|
[] | null | null | null | null | null |
|
GHSA-hjw8-vf2w-cgjx
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.6 | null | null |
|
CVE-2012-3414
|
Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function.
|
[
"cpe:2.3:a:swfupload_project:swfupload:*:*:*:*:*:*:*:*",
"cpe:2.3:a:swfupload_project:swfupload:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swfupload_project:swfupload:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swfupload_project:swfupload:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swfupload_project:swfupload:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tinymce:image_manager:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-vx97-8q8q-qgq5
|
Mattermost's detailed error messages reveal the full file path
|
Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored
|
[] | null | 4.3 | null | null | null |
CVE-2022-44424
|
In music service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2016-4512
|
Stack-based buffer overflow in ELCSimulator in Eaton ELCSoft 2.4.01 and earlier allows remote attackers to execute arbitrary code via a long packet.
|
[
"cpe:2.3:a:eaton:elcsoft:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | 7.5 | null |
|
GHSA-frm8-c9x4-2pg5
|
Directory traversal vulnerability in mcGallery PRO 2.2 and earlier allows remote attackers to read arbitrary files via the language parameter.
|
[] | null | null | null | null | null |
|
CVE-2014-9339
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the SPNbabble plugin 1.4.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) username or (2) password parameter in the spnbabble.php page to wp-admin/options-general.php.
|
[
"cpe:2.3:a:jayde_online:spnbabble:1.4.1:*:*:*:*:wordpress:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-vgwx-7mjc-5w5g
|
msnmsgr.exe in Windows Live Messenger (WLM) 2009 build 14.0.8064.206, and other 14.0.8064.x builds, allows remote attackers to cause a denial of service (application crash) via a modified header in a packet, as possibly demonstrated by a UTF-8.0 value of the charset field in the Content-Type header line. NOTE: this has been reported as a format string vulnerability by some sources, but the provenance of that information is unknown.
|
[] | null | null | null | null | null |
|
CVE-2009-0657
|
Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook user.
|
[
"cpe:2.3:h:toshiba:face_recognition:2.0.2.32:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2023-25103
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the gre_ip and the gre_mask variables.
|
[
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-x4wg-w7pm-7f26
|
A vulnerability has been identified in Teamcenter Active Workspace V4.3 (All versions < V4.3.11), Teamcenter Active Workspace V5.0 (All versions < V5.0.10), Teamcenter Active Workspace V5.1 (All versions < V5.1.6), Teamcenter Active Workspace V5.2 (All versions < V5.2.3). The application contains an unsafe unzipping pattern that could lead to a zip path traversal attack. This could allow and attacker to execute a remote shell with admin rights.
|
[] | null | null | null | null | null |
|
RHSA-2021:0940
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null | null |
ICSA-23-110-01
|
INEA ME RTU
|
Versions of INEA ME RTU firmware prior to 3.36 are vulnerable to OS command injection, which could allow an attacker to remotely execute arbitrary code. CVE-2023-2131 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 10 | null | null |
CVE-2008-6978
|
Unrestricted file upload vulnerability in Full Revolution aspWebAlbum 3.2 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in pics/, related to the uploadmedia action in album.asp.
|
[
"cpe:2.3:a:fullrevolution:aspwebalbum:3.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2021-37616
|
Null pointer dereference in Exiv2::Internal::resolveLens0x8ff
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A null pointer dereference was found in Exiv2 versions v0.27.4 and earlier. The null pointer dereference is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5.
|
[
"cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-3r4j-6h5p-7vp5
|
Illustrator versions 28.7.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-cp87-ch4g-957j
|
A vulnerability was found in SourceCodester Telecom Billing Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file main.cpp of the component Add New Record. The manipulation of the argument name leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 4.8 | 5.3 | null | null | null |
|
GHSA-pm66-94r7-2xrg
|
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with kernel privileges.
|
[] | null | null | null | null | null |
|
GHSA-j9f6-mfvw-mq97
|
InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2007-3199
|
Unrestricted file upload vulnerability in Link Request Contact Form 3.4 allows remote attackers to execute arbitrary PHP code by uploading a file with a .php extension and an image content type, as demonstrated by image/jpeg.
|
[
"cpe:2.3:a:american_financing:link_request_contact_form:3.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2008-0801
|
SQL injection vulnerability in index.php in the PAXXGallery (com_paxxgallery) 0.2 component for Mambo and Joomla! allow remote attackers to execute arbitrary SQL commands via (1) the iid parameter in a view action, and possibly (2) the userid parameter.
|
[
"cpe:2.3:a:paxxgallery:com_paxxgallery:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo-foundation:mambo:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gj5f-4m6m-67f6
|
The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows remote attackers to cause a denial of service (system hang) via crafted packets with malformed TCP selective acknowledgement (SACK) values, aka "TCP/IP Selective Acknowledgement Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2008-5802
|
SQL injection vulnerability in index.php in E-topbiz Online Store 1.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
|
[
"cpe:2.3:a:e-topbiz:online_store:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-fg2f-j7rp-247h
|
AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the id parameter at \admin\post_comments.php. This vulnerability allows attackers to access database information.
|
[] | null | 4.9 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.