Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-4rr8-cvf6-p4f6
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c.
[]
CVE-2019-16123
In Kartatopia PilusCart 1.4.1, the parameter filename in the file catalog.php is mishandled, leading to ../ Local File Disclosure.
[ "cpe:2.3:a:kartatopia:piluscart:*:*:*:*:*:*:*:*" ]
GHSA-pp6h-5j34-grmp
In fpc_ta_get_build_info of fpc_ta_kpi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-137014293References: N/A
[]
CVE-2023-6548
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
[ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:14.1:*:*:*:-:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:-:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.0:*:*:*:-:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:fips:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:fips:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:ndcpp:*:*:*", "cpe:2.3:a:citrix:netscaler_gateway:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:netscaler_gateway:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:netscaler_gateway:13.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*", "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*", "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*" ]
GHSA-3mg8-g497-8859
A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.2.0.160 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259501 was assigned to this vulnerability.
[]
GHSA-qcj3-h27m-mp9x
Openstack Octavia allows Insertion of Sensitive Information into Log File
In a default Red Hat Openstack Platform Director installation, openstack-octavia before versions openstack-octavia 2.0.2-5 and openstack-octavia-3.0.1-0.20181009115732 creates log files that are readable by all users. Sensitive information such as private keys can appear in these log files allowing for information exposure.
[]
GHSA-j23m-2qch-pvvp
Multiple cross-site scripting (XSS) vulnerabilities in index.cgi in Barracuda Spam Firewall (BSF) before 3.5.12.007, Message Archiver before 1.2.1.002, Web Filter before 3.3.0.052, IM Firewall before 3.1.01.017, and Load Balancer before 2.3.024 allow remote attackers to inject arbitrary web script or HTML via (1) the Policy Name field in Search Based Retention Policy in Message Archiver; unspecified parameters in the (2) IP Configuration, (3) Administration, (4) Journal Accounts, (5) Retention Policy, and (6) GroupWise Sync components in Message Archiver; (7) input to search operations in Web Filter; and (8) input used in error messages and (9) hidden INPUT elements in (a) Spam Firewall, (b) IM Firewall, and (c) Web Filter.
[]
GHSA-q2x2-4cf5-f275
Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta
[]
CVE-2014-8741
Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors.
[ "cpe:2.3:a:lexmark:markvision_enterprise:*:*:*:*:*:*:*:*" ]
CVE-2020-11836
OPPO Android Phone with MTK chipset and Android 8.1/9/10/11 versions have an information leak vulnerability. The “adb shell getprop ro.vendor.aee.enforcing” or “adb shell getprop ro.vendor.aee.enforcing” return no.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a12:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a15:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a15s:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a31:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a33:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a5:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a52:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a53:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:a9:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:f15:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:f17:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:f17_pro:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:reno_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:reno_2f:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:reno_2z:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:reno_3_pro:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:reno_4_pro:-:*:*:*:*:*:*:*", "cpe:2.3:h:oppo:reno_5_pro_5g:-:*:*:*:*:*:*:*" ]
GHSA-3xg5-v3r3-xvcq
In JetBrains TeamCity before 2021.2, health items of pull requests were shown to users who lacked appropriate permissions.
[]
GHSA-6mp6-q63m-fh2h
A vulnerability was found in Pixsoft Vivaz 6.0.11. It has been classified as problematic. Affected is an unknown function of the file /servlet?act=login&submit=1&evento=0&pixrnd=0125021817031859360231 of the component Login Endpoint. The manipulation of the argument sistema leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2023-1249
A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2022-45599
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.
[ "cpe:2.3:o:aztech:wmb250ac_firmware:016_2020:*:*:*:*:*:*:*", "cpe:2.3:h:aztech:wmb250ac:-:*:*:*:*:*:*:*" ]
GHSA-7v6q-3gw2-jc2p
The Detox Juicing Diet Recipes (aka com.wDetoxJuicingDietRecipes) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-7r3c-3rhp-45ch
Use-after-free vulnerability in Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Excel Services on SharePoint Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted calculatedColumnFormula object in an Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[]
GHSA-vhx2-58f3-9f8j
Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file.
[]
CVE-2010-1909
Buffer overflow in the RunCmd method in the SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to execute arbitrary code via vectors involving "CreateProcess params." NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*", "cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*", "cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*", "cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*", "cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*" ]
GHSA-f958-6c9p-jx25
A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information.
[]
GHSA-g4wm-3vx4-m4qq
Atom.CMS 2.0 is vulnerable to SQL Injection via Atom.CMS_admin_uploads.php
[]
GHSA-q36w-fgp3-q2gw
A local file inclusion vulnerability exists in haotian-liu/llava at commit c121f04. This vulnerability allows an attacker to access any file on the system by sending multiple crafted requests to the server. The issue is due to improper input validation in the gradio web UI component.
[]
CVE-2024-51022
Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the ssid parameter in bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[ "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*" ]
GHSA-h3qq-3jf5-8qc6
Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408.
[]
GHSA-28jh-gp7h-pj6v
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0278 and CVE-2014-0279.
[]
GHSA-hxf7-pgg4-qhm3
The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability.
[]
GHSA-j4m3-366v-h3q9
Cross-site scripting (XSS) vulnerability in Zoho ManageEngine EventLog Analyzer 11.12 allows remote attackers to inject arbitrary web script or HTML via the import logs feature.
[]
CVE-2020-23834
Insecure Service File Permissions in the bd service in Real Time Logic BarracudaDrive v6.5 allow local attackers to escalate privileges to admin by replacing the %SYSTEMDRIVE%\bd\bd.exe file. When the computer next starts, the new bd.exe will be run as LocalSystem.
[ "cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:*" ]
CVE-2022-0667
Assertion failure on delayed DS lookup
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
[ "cpe:2.3:a:isc:bind:9.18.0:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
CVE-2023-2384
Netgear SRX5308 Web Management Interface cross site scripting
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been declared as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument dhcp.SecDnsIPByte2 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*" ]
GHSA-r2c7-qvrq-pwg6
An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'.
[]
GHSA-ccpq-qrrm-9f6q
In the Linux kernel, the following vulnerability has been resolved:platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbiosinit_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems where the Dell WMI interface is supported. While exit_dell_smbios_wmi() unregisters it unconditionally, this leads to the following oops:[ 175.722921] ------------[ cut here ]------------ [ 175.722925] Unexpected driver unregister! [ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40 ... [ 175.723089] Call Trace: [ 175.723094] cleanup_module+0x5/0xedd [dell_smbios] ... [ 175.723148] ---[ end trace 064c34e1ad49509d ]---Make the unregister happen on the same condition the register happens to fix this.
[]
CVE-2016-2539
Cross-site request forgery (CSRF) vulnerability in install_modules.php in ATutor before 2.2.2 allows remote attackers to hijack the authentication of users for requests that upload arbitrary files and execute arbitrary PHP code via vectors involving a crafted zip file.
[ "cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*" ]
GHSA-7c59-c4r2-h8w2
Buffer overflow in the arp command of IBM AIX 5.3 L, 5.3, 5.2.2, 5.2 L, and 5.2 allows local users to cause a denial of service (crash) via a long iftype argument.
[]
CVE-2021-3971
A potential vulnerability by a driver used during older manufacturing processes on some consumer Lenovo Notebook devices that was mistakenly included in the BIOS image could allow an attacker with elevated privileges to modify firmware protection region by modifying an NVRAM variable.
[ "cpe:2.3:o:lenovo:ideapad_3-14ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14ada6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14ada6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14alc6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14are05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15ada6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15ada6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15alc6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15are05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15igl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15igl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17ada6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17ada6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17alc6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17are05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l3-15itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l3-15itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-15irh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-15irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-15iwl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-15iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-15iwl_touch_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-15iwl_touch:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-17irh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-17irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-17iwl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-17iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro-16ach6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro-16ach6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro-16ach6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro-16ach6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro-16ith6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro-16ith6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro-16ith6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro-16ith6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ach6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ach6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ach6a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ach6a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ach6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ach6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ith6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ith6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ith6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ith6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17ach6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17ach6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17ach6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17ach6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17ith6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17ith6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17ith6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17ith6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_7-16achg6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_7-16achg6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_7-16ithg6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_7-16ithg6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-15irh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-15irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-15irh-pg0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-15irh-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-17irh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-17irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-17irh-pg0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-17irh-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y545_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y545:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y545-pg0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y545-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y7000-2019_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y7000-2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y7000-2019-pg0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y7000-2019-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-14api_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-14api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-14ast_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-14ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-14igm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-14igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-14iil_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-14iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-15api_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-15api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-15ast_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-15ast:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-15igm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-15igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s145-15iil_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s145-15iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s540-13api_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s540-13api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14_g2-acl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14_g2-acl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14-ada_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14-ada:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14-are_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14-are:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14-igl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14-igl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14-iil_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14-iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v140-15iwl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v140-15iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15_g2-alc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15_g2-alc:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15-ada_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15-ada:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15-igl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15-igl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15-iil_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15-iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v17-iil_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v17-iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v340-17iwl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v340-17iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_d:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_od_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_od:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14igl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14igl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5-15are05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5-15are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_gaming_3-15arh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_gaming_3-15arh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*" ]
CVE-2023-20880
VMware Aria Operations contains a privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'.
[ "cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ]
CVE-2007-1276
Multiple cross-site scripting (XSS) vulnerabilities in chooser.cgi in Webmin before 1.330 and Usermin before 1.260 allow remote attackers to inject arbitrary web script or HTML via a crafted filename.
[ "cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.210:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.220:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.230:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.240:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.250:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.3.20:*:*:*:*:*:*:*" ]
GHSA-pf99-2jcr-hrxm
Blizzard Entertainment StarCraft Brood War 1.15.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed map, which triggers an out-of-bounds read during a minimap preview.
[]
CVE-2022-49714
irqchip/realtek-rtl: Fix refcount leak in map_interrupts
In the Linux kernel, the following vulnerability has been resolved: irqchip/realtek-rtl: Fix refcount leak in map_interrupts of_find_node_by_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. This function doesn't call of_node_put() in error path. Call of_node_put() directly after of_property_read_u32() to cover both normal path and error path.
[]
GHSA-8cqv-gpw9-fq7h
Memory Corruption in SPS Application while exporting public key in sorter TA.
[]
CVE-2023-7192
Kernel: refcount leak in ctnetlink_create_conntrack()
A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.
[ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/a:redhat:rhel_tus:8.2::realtime", "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/a:redhat:rhel_tus:8.4::realtime", "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/o:redhat:rhel_eus:9.0::baseos", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::realtime", "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2017-11109
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
[ "cpe:2.3:a:vim:vim:8.0:*:*:*:*:*:*:*" ]
CVE-2023-39533
libp2p nodes vulnerable to attack using large RSA keys
go-libp2p is the Go implementation of the libp2p Networking Stack. Prior to versions 0.27.8, 0.28.2, and 0.29.1 malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step. To prevent this attack, go-libp2p versions 0.27.8, 0.28.2, and 0.29.1 restrict RSA keys to <= 8192 bits. To protect one's application, it is necessary to update to these patch releases and to use the updated Go compiler in 1.20.7 or 1.19.12. There are no known workarounds for this issue.
[ "cpe:2.3:a:libp2p:go-libp2p:*:*:*:*:*:go:*:*", "cpe:2.3:a:libp2p:go-libp2p:0.29.0:*:*:*:*:go:*:*" ]
GHSA-2gf6-g5m3-qg3c
Technicolor DPC2320 dpc2300r2-v202r1244101-150420a-v6 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
[]
GHSA-px39-46h2-2hqq
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS408EPP before 1.0.0.15, GS808E before 1.7.0.7, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, and GSS108EPP before 1.0.0.15.
[]
CVE-2024-46871
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2023-3317
A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*" ]
CVE-2014-5421
CareFusion Pyxis SupplyStation 8.1 with hardware test tool 1.0.16 and earlier has a hardcoded database password, which makes it easier for local users to gain privileges by leveraging cabinet access.
[ "cpe:2.3:h:carefusion:pyxis_supplystation:8.1:*:*:*:*:*:*:*" ]
GHSA-2hv6-3c5r-xmfv
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. Set3G param is not object. An attacker can send an HTTP request to trigger this vulnerability.
[]
GHSA-xjjg-vmw6-c2p9
Open Redirect in httpie
All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.
[]
CVE-2012-4823
Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes & Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to "insecure use of the java.lang.ClassLoder defineClass() method."
[ "cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_sametime:8.0.80407:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_sametime:8.0.80822:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_sametime:8.5.1.20100709-1631:*:*:*:advanced_embedded:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.3:interim_fix_1:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_change:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_change:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_change:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_change:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:1.6.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:8.0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:9.0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:10.0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:10.0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:11.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:11.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:11.0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:11.0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:11.0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_host_on-demand:11.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:service_delivery_manager:7.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:service_delivery_manager:7.2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:smart_analytics_system_5600_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:smart_analytics_system_5600_software:9.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_remote_control:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_real_time:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_real_time:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tivoli_storage_productivity_center:5.0:*:*:*:*:*:*:*:*", "cpe:2.3:a:tivoli_storage_productivity_center:5.1:*:*:*:*:*:*:*:*", "cpe:2.3:a:tivoli_storage_productivity_center:5.1.1:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:smart_analytics_system_5600:7200:*:*:*:*:*:*:*" ]
GHSA-8v5c-chfg-fcjx
An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment.
[]
GHSA-cjvp-xw2h-c8v3
Directory traversal vulnerability in McAfee Web Gateway (MWG) 7.4.x before 7.4.1, 7.3.x before 7.3.2.6, and 7.2.0.9 and earlier allows remote authenticated users to read arbitrary files via a crafted request to the web filtering port.
[]
CVE-2020-1219
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.
[ "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*" ]
CVE-2024-56901
A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASWeb application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Administrator accounts via a crafted GET request method. This vulnerability is used in chain with CVE-2024-56903 for a successful CSRF attack.
[]
GHSA-c2j7-mgrp-5g3p
Untrusted search path vulnerability in Empirical Project Monitor - eXtended all versions allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
CVE-2023-2640
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
[ "cpe:2.3:o:canonical:ubantu_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*" ]
GHSA-63gm-vx3p-q2xg
Unknown vulnerability in newtask for Solaris 9 allows local users to gain root privileges.
[]
CVE-2017-16725
A Stack-based Buffer Overflow issue was discovered in Xiongmai Technology IP Cameras and DVRs using the NetSurveillance Web interface. The stack-based buffer overflow vulnerability has been identified, which may allow an attacker to execute code remotely or crash the device. After rebooting, the device restores itself to a more vulnerable state in which Telnet is accessible.
[ "cpe:2.3:o:xiongmaitech:ahb7008f8-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f8-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f4-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f4-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f2-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f2-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-h-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t4-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t4-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t4-h-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-h-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2:_firmware:4.02.r11.7601:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f8-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f8-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7808r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7808r-ms-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-ms-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t4-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f8-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f8-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f8-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f4-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f4-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f2-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f2-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7808r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7808r-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-lms-v3_firmware:4.02.r11.nat.onvifc.20171019:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-lms-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f8-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f8-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f4-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f4-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f2-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f2-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f2-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f2-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f8-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f4-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f2-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f2-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-lme-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-lme-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-lme-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7808r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7808r-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-52h10pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-52h10pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-52h10pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-52h10pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pet-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pet-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pls-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pls-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pes-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pes-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pes-sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pes-sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h40pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h40pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h40pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h40pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h50p-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h50p-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h50p-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h50p-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h10pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h10pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50hv10pt-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50hv10pt-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50v10pl-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50v10pl-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-54h13pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-54h13pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-54h20pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-54h20pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-o\\(r\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-o\\(r\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pt-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pt-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pa-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pa-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20pet-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20pet-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20pet-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20pet-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20pes-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20pes-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrm:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrm:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h40af_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h40af:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50v10pl-wrc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrc:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50x10pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50x10pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50x10pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50x10pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53x13pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53x13pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53x13pa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53x13pa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53x13pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53x13pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrc:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53hv13pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53hv13pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53v13pl-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53v13pl-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53h13pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53h13pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk-2f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk-2f:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pa-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pa-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50hv20pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50hv20pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pv-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pv-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pv-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pv-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-80h20pt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-80h20pt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-80h20pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-80h20pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h20pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h20pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20py-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20py-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk-4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk-4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pa-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pa-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20psa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20psa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20psb-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20psb-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20psb-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20psb-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ivg-hp203y-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ivg-hp203y-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ivg-hp203y-se_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ivg-hp203y-se:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-hp500nr-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-hp500nr-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-80he20ps-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-80he20ps-s:-:*:*:*:*:*:*:*" ]
GHSA-87j9-45v6-cvx8
WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking.
[]
CVE-2013-1429
Lintian before 2.5.12 allows remote attackers to gather information about the "host" system using crafted symlinks.
[ "cpe:2.3:a:debian:lintian:*:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" ]
GHSA-fvh6-48v9-mqh2
Windows Themes Spoofing Vulnerability
[]
GHSA-m734-688v-8r3r
Stack-based buffer overflow in Nullsoft Winamp 5.12 and 5.13 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted .m3u file that causes an incorrect strncpy function call when the player pauses or stops the file.
[]
GHSA-v79g-8rxh-2q7g
Improper Input Validation vulnerability in handling apdu of libsec-ril prior to SMR Apr-2024 Release 1 allows local privileged attackers to write out-of-bounds memory.
[]
CVE-2014-4884
The Conrad Hotel (aka com.wConradHotel) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:conrad_hotel_project:conrad_hotel:0.1:*:*:*:*:android:*:*" ]
CVE-2015-5660
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.
[ "cpe:2.3:a:extplorer:extplorer:*:*:*:*:*:*:*:*" ]
GHSA-8973-436w-prf3
NetApp OnCommand Unified Manager for Linux versions 7.2 through 7.3 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service bound to the network, and are susceptible to unauthenticated remote code execution.
[]
GHSA-9xp3-mp9c-47rf
A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
[]
GHSA-mx46-jh22-vrmf
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
[]
GHSA-5hfv-r9xg-387j
SQL injection vulnerability in index.php in IntegraMOD 1.4.0 and earlier allows remote attackers to execute arbitrary SQL commands via double-encoded "'" characters in the STYLE_URL parameter.
[]
GHSA-jh3w-4vvf-mjgr
Django has regular expression denial of service vulnerability in EmailValidator/URLValidator
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, `EmailValidator` and `URLValidator` are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
[]
CVE-2009-2056
Cisco IOS XR 3.8.1 and earlier allows remote authenticated users to cause a denial of service (process crash) via vectors involving a BGP UPDATE message with many AS numbers prepended to the AS path.
[ "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.3:*:crs-1:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.3:*:prp:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*" ]
GHSA-287c-cc7v-7v95
The Categorify plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7.4. This is due to missing or incorrect nonce validation on the categorifyAjaxUpdateFolderPosition function. This makes it possible for unauthenticated attackers to update the folder position of categories as well as update the metadata of other taxonomies via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-v3jv-wrf4-5845
Local Privilege Escalation in npm
Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation.RecommendationUpdate to version 1.3.3 or later.
[]
CVE-2018-15798
Pivotal Concourse allows malicious redirect urls on login
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
[ "cpe:2.3:a:pivotal_software:concourse:*:*:*:*:*:*:*:*" ]
GHSA-m8m3-3pmc-xj5p
An improper certificate validation vulnerability was reported in LADM that could allow a network attacker with the ability to redirect an update request to a remote server and execute code with elevated privileges.
[]
CVE-2022-24154
Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetRebootTimer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the rebootTime parameter.
[ "cpe:2.3:o:tenda:ax3_firmware:16.03.12.10_cn:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*" ]
GHSA-5px9-63j7-5f27
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.
[]
CVE-2018-11164
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 22 of 46).
[ "cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*" ]
CVE-2016-2836
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*" ]
GHSA-2fp3-g54x-pvwq
FTPGetter Standard v.5.97.0.177 allows remote code execution when a user initiates an FTP connection to an attacker-controlled machine that sends crafted responses. Long responses can also crash the FTP client with memory corruption.
[]
CVE-2024-2471
The FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image attachment fields (such as 'Title', 'Alt Text', 'Custom URL', 'Custom Class', and 'Override Type') in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2024-1489
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.6.9. This is due to missing or incorrect nonce validation on the processBulkAction function. This makes it possible for unauthenticated attackers to delete pages and posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
CVE-2014-8871
Directory traversal vulnerability in hybris Commerce software suite 5.0.3.3 and earlier, 5.0.0.3 and earlier, 5.0.4.4 and earlier, 5.1.0.1 and earlier, 5.1.1.2 and earlier, 5.2.0.3 and earlier, and 5.3.0.1 and earlier.
[ "cpe:2.3:a:sap:hybris:*:*:*:*:*:*:*:*" ]
CVE-2024-4915
Campcodes Online Examination System result.php sql injection
A vulnerability, which was classified as critical, was found in Campcodes Online Examination System 1.0. Affected is an unknown function of the file result.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264450 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*" ]
GHSA-qh2c-49jf-6c8g
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS.This issue affects Newsletters: from n/a through 4.9.9.1.
[]
CVE-2023-0988
SourceCodester Online Pizza Ordering System cross-site request forgery
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability.
[ "cpe:2.3:a:online_pizza_ordering_system_project:online_pizza_ordering_system:1.0:*:*:*:*:*:*:*" ]
GHSA-4344-38jh-mj6x
Unspecified vulnerability in SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 before 15.0.3 ESD#4.3, 15.5 before 15.5 ESD#5.3, and 15.7 before 15.7 SP50 or 15.7 SP100 allows local users to obtain sensitive information via unspecified vectors.
[]
GHSA-7gfx-wxfh-7rvm
Smarty Path Traversal Vulnerability
`Smarty_Security::isTrustedResourceDir()` in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
[]
GHSA-cqmc-38m3-4v5v
Cross-site scripting (XSS) vulnerability in the NGP COO/CWP Integration (crmngp) module 6.x before 6.x-1.12 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified "user-supplied information."
[]
CVE-2023-4612
MFA bypass in Apereo CAS
Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability.
[ "cpe:2.3:a:apereo:central_authentication_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc7:*:*:*:*:*:*" ]
CVE-2025-3340
codeprojects Online Restaurant Management System combo_update.php sql injection
A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/combo_update.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-33q5-mhvx-53mf
The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
[]
CVE-2020-17395
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.4. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the prl_naptd process. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. Was ZDI-CAN-11134.
[ "cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:macos:*:*" ]
CVE-2019-10418
Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
[ "cpe:2.3:a:jenkins:kubernetes_pipeline:*:*:*:*:*:jenkins:*:*" ]
CVE-2023-28371
In Stellarium through 1.2, attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal.
[ "cpe:2.3:a:stellarium:stellarium:*:*:*:*:*:*:*:*" ]
GHSA-h3g7-crqm-323f
modules/certs/manifests/config.pp in katello-configure before 1.3.3.pulpv2 in Katello uses weak permissions (666) for the Candlepin bootstrap RPM, which allows local users to modify the Candlepin CA certificate by writing to this file.
[]
GHSA-f6vv-86p4-jjqr
An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
[]
CVE-2021-47325
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation The reference counting issue happens in several exception handling paths of arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the function forgets to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by jumping to "out" label when those error scenarios occur.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2019-11499
In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.
[ "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
GHSA-34m4-9vvp-p7j9
A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/updateroutine.php. The manipulation of the argument tid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]