id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-hp57-8q89-468c | Cross-site request forgery (CSRF) vulnerability in Cisco FireSIGHT System Software 5.4.1.2 and 6.0.0 in FireSIGHT Management Center allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu94721. | [] |
|
CVE-2018-15444 | Cisco Energy Management Suite XML External Entity Vulnerability | A vulnerability in the web-based user interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by convincing a user of an affected system to import a crafted XML file with malicious entries, which could allow the attacker to read and write files within the affected application. | [
"cpe:2.3:a:cisco:energy_management_suite_software:-:*:*:*:*:*:*:*"
] |
GHSA-f3jr-rvxv-mh4w | Multiple SQL injection vulnerabilities in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allow remote administrators to execute arbitrary SQL commands via unspecified vectors. | [] |
|
GHSA-h9fm-r36v-gmw8 | WonderCMS 3.1.3 is affected by cross-site scripting (XSS) in the Admin Panel. An attacker can inject the XSS payload in Page keywords and each time any user will visit the website, the XSS triggers, and the attacker can able to steal the cookie according to the crafted payload. | [] |
|
CVE-2018-17770 | Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N. | [
"cpe:2.3:o:ingenico:telium_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ingenico:telium_2:-:*:*:*:*:*:*:*"
] |
|
GHSA-jf69-ffp6-3g7g | A potential security vulnerability has been identified in HP UCMDB Configuration Manager versions 10.10, 10.11, 10.20, 10.21, 10.22, 10.23. These vulnerabilities could be remotely exploited to allow code execution. | [] |
|
GHSA-6wm8-q34j-2mc2 | An issue was discovered in Open5gs v2.7.2. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of gmm_state_exception() function upon receipt of the Nausf_UEAuthentication_Authenticate response. | [] |
|
CVE-2023-1037 | SourceCodester Dental Clinic Appointment Reservation System POST Parameter login.php sql injection | A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /APR/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221795. | [
"cpe:2.3:a:dental_clinic_appointment_reservation_system_project:dental_clinic_appointment_reservation_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-43qp-56c9-mg75 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17111. | [] |
|
GHSA-52f2-j43x-hh76 | On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX series routers can result in a PFE (Packet Forwarding Engine) hang or crash. | [] |
|
GHSA-5hv5-7p47-rvcp | In Content Resolver, there is a possible method to access metadata about existing content providers on the device due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2021-38646 | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*"
] |
CVE-2021-29369 | The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands. | [
"cpe:2.3:a:gnuplot_project:gnuplot:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2009-4015 | Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allows remote attackers to execute arbitrary commands via shell metacharacters in filename arguments. | [
"cpe:2.3:a:debian:lintian:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.8:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.9:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.11:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.12:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.13:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.14:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.15:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.16:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.17:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.18:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.19:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.20:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.22:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.23:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.24:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.25:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.26:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.27:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.23.28:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.0-rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.0-rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2006-6990 | Cross-domain vulnerability in Enigma Browser 3.8.8 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280. | [
"cpe:2.3:a:advanced_search_technologies_inc.:enigma_browser:3.8.8:*:*:*:*:*:*:*"
] |
|
GHSA-3qqv-wmpg-38v7 | get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY. | [] |
|
CVE-2022-43679 | The Docker image of ownCloud Server through 10.11 contains a misconfiguration that renders the trusted_domains config useless. This could be abused to spoof the URL in password-reset e-mail messages. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-31948 | Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/classes/Master.php?f=delete_report. | [
"cpe:2.3:a:rescue_dispatch_management_system_project:rescue_dispatch_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-28388 | Uncontrolled search path element in some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:chipset_device_software:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-6410 | ProfileGrid <= 5.8.9 - Authenticated (Subscriber+) Insecure Direct Object Reference | The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.8.9 via the 'pm_upload_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the profile picture of any user. | [
"cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:*:*:*"
] |
GHSA-rx2m-xr4x-54hh | usememos/memos vulnerable to Improper Authorization | usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | [] |
GHSA-83q6-vf2m-vc99 | Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5588, and CVE-2015-6677. | [] |
|
GHSA-8v75-gpj5-x889 | SQL injection vulnerability in read.php3 and other scripts in Phorum 3.0.7 allows remote attackers to execute arbitrary SQL queries via the sSQL parameter. | [] |
|
CVE-2018-0144 | A vulnerability in the web-based management interface of Cisco Prime Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvg81051. | [
"cpe:2.3:a:cisco:prime_data_center_network_manager:10.4\\(1.109\\):*:*:*:*:*:*:*"
] |
|
CVE-2019-19052 | A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*"
] |
|
GHSA-rrp8-8j9r-pxg2 | In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, while processing a StrHwPlatform with length smaller than EFICHIPINFO_MAX_ID_LENGTH, an array out of bounds access may occur. | [] |
|
CVE-2021-20379 | IBM Guardium Data Encryption (GDE) 3.0.0.3 and 4.0.0.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 195711. | [
"cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:guardium_data_encryption:4.0.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-4xx3-xg55-3wr5 | Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
GHSA-3cgr-wxhv-h7xw | LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5. | [] |
|
GHSA-4683-gq97-9p3g | Secure Internet Live Conferencing (SILC) 0.9.11 and 0.9.12 stores passwords and sessions in plaintext in memory, which could allow local users to obtain sensitive information. | [] |
|
CVE-2022-33306 | Buffer over-read in WLAN | Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs. | [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2062:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9986:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6102_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_gen3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx_gen3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] |
GHSA-5hv9-j8qv-9mvq | Adobe Animate version 21.0.9 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted FLA file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2014-9201 | Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. | [
"cpe:2.3:h:beckwithelectric:m-2001d_digital_tapchanger_control:-:*:*:*:*:*:*:*",
"cpe:2.3:h:beckwithelectric:m-6200_digital_voltage_regulator_control:-:*:*:*:*:*:*:*",
"cpe:2.3:h:beckwithelectric:m-6200a_digital_voltage_regulator_control:-:*:*:*:*:*:*:*",
"cpe:2.3:h:beckwithelectric:m-6280_digital_capacitor_bank_control:-:*:*:*:*:*:*:*",
"cpe:2.3:h:beckwithelectric:m-6280a_digital_capacitor_bank_control:-:*:*:*:*:*:*:*",
"cpe:2.3:h:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control:-:*:*:*:*:*:*:*",
"cpe:2.3:o:beckwithelectric:m-2001d_digital_tapchanger_control_d-0214_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:beckwithelectric:m-6200_digital_voltage_regulator_control_d-0198_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:beckwithelectric:m-6200a_digital_voltage_regulator_control_d-0228_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:beckwithelectric:m-6280_digital_capacitor_bank_control_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:beckwithelectric:m-6280a_digital_capacitor_bank_control_d-0254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control_d-0346_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-5rmf-p9h9-9cv3 | WebKit in Apple iOS before 9 allows man-in-the-middle attackers to conduct redirection attacks by leveraging the mishandling of the resource cache of an SSL web site with an invalid X.509 certificate. | [] |
|
CVE-2022-4767 | Denial of Service in usememos/memos | Denial of Service in GitHub repository usememos/memos prior to 0.9.1. | [
"cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*"
] |
CVE-2016-0398 | IBM Cognos Analytics (CA) 11.0 before 11.0.2 allows remote attackers to conduct content-spoofing attacks via a crafted URL. | [
"cpe:2.3:a:ibm:cognos_analytics:11.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-fc89-33h9-mh65 | An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices. Cached credentials are not erased from an access point returning wirelessly from a disconnected state. This may provide unintended network access. | [] |
|
GHSA-gjqm-xj5v-7cvf | Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation. | [] |
|
GHSA-p3xm-vpj8-m644 | An exploitable code execution vulnerability exists in the BMP image rendering functionality of SDL2_image-2.0.2. A specially crafted BMP image can cause a stack overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. | [] |
|
CVE-2012-4451 | Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper. | [
"cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-fw5p-r5cw-5r92 | A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1200, CVE-2020-1210, CVE-2020-1453, CVE-2020-1576, CVE-2020-1595. | [] |
|
CVE-2007-0750 | Integer overflow in CoreGraphics in Apple Mac OS X 10.4 up to 10.4.9 allows remote user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted PDF file. | [
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*"
] |
|
CVE-2019-3706 | Web Interface Authentication Bypass Vulnerability | Dell EMC iDRAC9 versions prior to 3.24.24.24, 3.21.26.22, 3.22.22.22 and 3.21.25.22 contain an authentication bypass vulnerability. A remote attacker may potentially exploit this vulnerability to bypass authentication and gain access to the system by sending specially crafted data to the iDRAC web interface. | [
"cpe:2.3:o:dell:idrac9_firmware:3.20.21.20:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:idrac9_firmware:3.21.24.22:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:idrac9_firmware:3.23.23.23:*:*:*:*:*:*:*"
] |
GHSA-rhv8-c8mx-v4h4 | Under certain mode of operations, HLOS may be able get direct or indirect access through DXE channels to tamper with the authenticated WCNSS firmware stored in DDR because DXE-accessible memory is located within the authenticated image in Snapdragon Mobile and Snapdragon Wear in version MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 617. | [] |
|
GHSA-m8hp-crh9-hrrf | Online Diagnostic Lab Management System version 1.0 remote exploit that bypasses login with SQL injection and then uploads a shell. | [] |
|
CVE-2011-0670 | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] |
|
CVE-2022-22538 | When a user opens a manipulated Adobe Illustrator file format (.ai, ai.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] |
|
GHSA-2wvj-9m7h-43j3 | An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption. | [] |
|
GHSA-cw5g-6vjh-8wpg | The IBM WebSphere DataPower XML Accelerator XA35, Low Latency Appliance XM70, Integration Appliance XI50, B2B Appliance XB60, and XML Security Gateway XS40 SOA Appliances before 3.8.0.0, when a QLOGIC Ethernet interface is used, allow remote attackers to cause a denial of service (interface outage) via malformed ICMP packets to the 0.0.0.0 destination IP address. | [] |
|
GHSA-mcw3-phf9-3frr | Ashlar-Vellum Cobalt Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17985. | [] |
|
CVE-2007-3923 | The Common Internet File System (CIFS) optimization in Cisco Wide Area Application Services (WAAS) 4.0.7 and 4.0.9, as used by Cisco WAE appliance and the NM-WAE-502 network module, when Edge Services are configured, allows remote attackers to cause a denial of service (loss of service) via a flood of TCP SYN packets to port (1) 139 or (2) 445. | [
"cpe:2.3:h:cisco:wide_area_application_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wide_area_application_engine_nm-wae-502:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services:4.0.9:*:*:*:*:*:*:*"
] |
|
CVE-2025-22556 | WordPress Norse Rune Oracle plugin <= 1.4.1 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Greg Whitehead Norse Rune Oracle Plugin allows Cross Site Request Forgery.This issue affects Norse Rune Oracle Plugin: from n/a through 1.4.1. | [] |
GHSA-5rm6-jff6-vg9v | An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data. | [] |
|
CVE-2007-0713 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie file. | [
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*"
] |
|
GHSA-rvp7-wrjj-rgvf | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. | [] |
|
GHSA-q728-88fr-65v3 | A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. | [] |
|
GHSA-hfxr-3rpj-gp54 | The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors. | [] |
|
CVE-2013-2160 | The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors. | [
"cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*"
] |
|
GHSA-4gmc-62g5-x8wf | Cross-site scripting (XSS) vulnerability in the Web Links module 6.x-2.x before 6.x-2.6 and 7.x-1.x before 7.x-1.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-cc9g-8gq4-65mp | An exploitable information disclosure vulnerability exists in the way Nitro Pro 13.9.1.155 does XML error handling. A specially crafted PDF document can cause uninitialized memory access resulting in information disclosure. In order to trigger this vulnerability, victim must open a malicious file. | [] |
|
CVE-2023-46424 | TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_422BD4 function. | [
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] |
|
GHSA-rwff-5xh4-69fc | SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Reader::getU30(). | [] |
|
CVE-2017-18515 | The wp-statistics plugin before 12.0.8 for WordPress has SQL injection. | [
"cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-51906 | WordPress RSV 360 View plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rapid Sort RSV 360 View allows DOM-Based XSS.This issue affects RSV 360 View: from n/a through 1.0. | [] |
CVE-2014-6289 | The Ajax dispatcher for Extbase in the Yet Another Gallery (yag) extension before 3.0.1 and Tools for Extbase development (pt_extbase) extension before 1.5.1 allows remote attackers to bypass access restrictions and execute arbitrary controller actions via unspecified vectors. | [
"cpe:2.3:a:daniel_lienert:yet_another_gallery:*:*:*:*:*:typo3:*:*",
"cpe:2.3:a:michael_knoll:tools_for_extbase_developmen:*:*:*:*:*:typo3:*:*"
] |
|
GHSA-p3rq-cm49-f76p | Data corruption vulnerability in firmware in Intel Solid-State Drive Consumer, Professional, Embedded, Data Center affected firmware versions LSBG200, LSF031C, LSF036C, LBF010C, LSBG100, LSF031C, LSF036C, LBF010C, LSF031P, LSF036P, LBF010P, LSF031P, LSF036P, LBF010P, LSMG200, LSF031E, LSF036E, LSMG100, LSF031E, LSF036E, LSDG200, LSF031D, LSF036D allows local users to cause a denial of service via unspecified vectors. | [] |
|
CVE-2009-4215 | Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs. | [
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:32-bit:*:*:*:*:*",
"cpe:2.3:a:pandasecurity:panda_antivirus:2010:*:pro:*:*:*:*:*",
"cpe:2.3:a:pandasecurity:panda_global_protection:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:pandasecurity:panda_internet_security:2010:*:pro:*:*:*:*:*"
] |
|
CVE-2024-57933 | gve: guard XSK operations on the existence of queues | In the Linux kernel, the following vulnerability has been resolved:
gve: guard XSK operations on the existence of queues
This patch predicates the enabling and disabling of XSK pools on the
existence of queues. As it stands, if the interface is down, disabling
or enabling XSK pools would result in a crash, as the RX queue pointer
would be NULL. XSK pool registration will occur as part of the next
interface up.
Similarly, xsk_wakeup needs be guarded against queues disappearing
while the function is executing, so a check against the
GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the
disabling of the bit and the synchronize_net() in gve_turndown. | [] |
GHSA-hg8f-7r33-vp6x | Improper sanitization of incoming intent in Dressroom prior to SMR Jan-2022 Release 1 allows local attackers to read and write arbitrary files without permission. | [] |
|
CVE-2022-2993 | bt: host: Wrong key validation check | There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet. | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] |
GHSA-jp26-88mw-89qr | sigstore-java has a vulnerability with bundle verification | Summarysigstore-java has insufficient verification for a situation where a bundle provides a invalid signature for a checkpoint.ImpactThis bug impacts clients using any variation of KeylessVerifier.verify()Currently checkpoints are only used to ensure the root hash of an inclusion proof was provided by the log in question. Failing to validate that means a bundle may provide an inclusion proof that doesn't actually correspond to the log in question. This may eventually lead a monitor/witness being unable to detect when a compromised logs are providing different views of themselves to different clients.There are other mechanisms right now that mitigate this, such as the signed entry timestamp. Sigstore-java currently requires a valid signed entry timestamp. By correctly verifying the signed entry timestamp we can make certain assertions about the log signing the log entry (like the log was aware of the artifact signing event and signed it). Therefore the impact on clients that are not monitors/witnesses is very low.All cryptographic materials and identity information in the bundle must still be verified for the verification to pass. A valid signed entry timestamp is still required for verification to pass.sigstore-gradle-plugin and sigstore-maven-plugin are not affected by this as they only provide signing functionality.Steps To ReproduceBuild the java sigstore-cli at v1.1.0Create some random blob and sign itModify the checkpoint signature on the bundle, this is the last base64 section in the checkpoint, the following diff just swaps changes the last 3 base64 characters to aaa.PatchesPatched in v1.2.0 release (patch: https://github.com/sigstore/sigstore-java/commit/23fb4885e6704a5df4977f7acf253a745349edf9)
Conformance tests added https://github.com/sigstore/sigstore-conformance/pull/139WorkaroundsVerifiers may chose to verify the checkpoint manually after running `KeylessVerifier.verify()` | [] |
CVE-2008-3037 | Cross-site scripting (XSS) vulnerability in the Address Directory (sp_directory) extension 0.2.10 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:typo3:address_directory:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-24348 | Side Menu < 3.1.5 - Authenticated (admin+) SQL Injection | The menu delete functionality of the Side Menu – add fixed side buttons WordPress plugin before 3.1.5, available to Administrator users takes the did GET parameter and uses it into an SQL statement without proper sanitisation, validation or escaping, therefore leading to a SQL Injection issue | [
"cpe:2.3:a:wow-estore:side_menu:*:*:*:*:*:wordpress:*:*"
] |
GHSA-vmxg-xhmf-mrv5 | selinux-policy as packaged in Red Hat OpenShift 2 allows attackers to obtain process listing information via a privilege escalation attack. | [] |
|
GHSA-367j-phrj-8hv2 | IBM WebSphere Portal 6.0.0.x through 6.0.0.1, 6.0.1.x through 6.0.1.7, 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF26, and 8.0.0.x through 8.0.0.1 CF08 allows remote attackers to obtain sensitive Java Content Repository (JCR) information via a modified Web Content Manager (WCM) URL. | [] |
|
CVE-2024-32723 | WordPress Advanced Floating Content plugin <= 1.2.5 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Tides Advanced Floating Content allows Stored XSS.This issue affects Advanced Floating Content: from n/a through 1.2.5.
| [] |
CVE-2017-14306 | STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000006e10." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] |
|
GHSA-hqhf-8jgc-h5hx | Magento 2 Community Edition Path Traversal Vulnerability | A path traversal vulnerability in the WYSIWYG editor for Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could result in unauthorized access to uploaded images due to insufficient access control. | [] |
GHSA-jx5x-5x47-rh28 | In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c. | [] |
|
CVE-2012-2080 | Cross-site request forgery (CSRF) vulnerability in the Node Limit Number module before 6.x-1.2 for Drupal allows remote attackers to hijack the authentication of users with the administer node limitnumber permission for requests that delete limits. | [
"cpe:2.3:a:node_limit_number_project:node_limitnumber:*:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.1-2:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.1-3:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
GHSA-wx67-2xhp-3w8f | The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input. | [] |
|
CVE-2023-30253 | Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-32965 | ssrf vulnerability in lobe-chat | Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*"
] |
GHSA-pmqw-p3fw-qvp9 | PHP remote file inclusion vulnerability in index.php in Longino Jacome php-Revista 1.1.2 allows remote attackers to execute arbitrary PHP code via the adodb parameter. | [] |
|
GHSA-w993-3vv8-hxp8 | In the Linux kernel, the following vulnerability has been resolved:kunit: Fix potential null dereference in kunit_device_driver_test()kunit_kzalloc() may return a NULL pointer, dereferencing it without
NULL check may lead to NULL dereference.
Add a NULL check for test_state. | [] |
|
CVE-2014-7475 | The Ionic View (aka com.ionic.viewapp) application 0.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:drifty:ionic_view:0.0.2:*:*:*:*:android:*:*"
] |
|
GHSA-j8rg-4hjm-8r95 | Path traversal vulnerability in Jenkins Publish Over SSH Plugin | Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files. | [] |
GHSA-xfwm-3cfp-v279 | tss 0.8.1 allows local users to read arbitrary files via the -a parameter, which is processed while tss is running with privileges. | [] |
|
GHSA-74vx-9hfr-h68r | LG Electronics Mobile WiFi router L-09C, L-03E, and L-04D does not restrict access to the web administration interface, which allows remote attackers to obtain sensitive information via unspecified vectors. | [] |
|
CVE-2024-12026 | Message Filter for Contact Form 7 <= 1.6.3 - Missing Authorization to Authenticated (Subscriber+) New Filter Creation | The Message Filter for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the saveFilter() function in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new filters. | [] |
CVE-2021-20870 | Improper handling of exceptional conditions vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, bizhub 4752/4052 GC9-X4 and earlier, bizhub C3850/C3350/3850FS, bizhub 4750/4050, bizhub C3110, bizhub C3100P) allows a physical attacker to obtain unsent scanned image data when scanned data transmission is stopped due to the network error by ejecting a HDD before the scan job times out. | [
"cpe:2.3:o:konicaminolta:bizhub_c750i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c750i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c650i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c650i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c550i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c550i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c450i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c360i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c300i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c250i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_750i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_750i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_650i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_550i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_450i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_450i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_360i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_360i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_300i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_300i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c287i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c287i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c257i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c257i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c227i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c227i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_306i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_306i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_266i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_266i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_226i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_226i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c759_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c759:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c659_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c659:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c658_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c658:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c558_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c458_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_958_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_808_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_758_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_658e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_658e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_558e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_558e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_458e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_458e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c287_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c287:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c227_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c227:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_287_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_287:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_227_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_227:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_368e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_368e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_308e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_308e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c368_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c308_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c258_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_558_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_458_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_368_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_308_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c754e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c654e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_754e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_754e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_654e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_654e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c554e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c554e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c454e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c454e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c364e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c364e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c284e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c284e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c224e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c224e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_554e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_554e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_454e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_454e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_364e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_364e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_284e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_284e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_224e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_224e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c364_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c284_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c4050i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c4050i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3350i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3350i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c4000i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c4000i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3300i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3300i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3320i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3320i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4750i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4750i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4050i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4050i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4700i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4700i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3851fs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3851fs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3851_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3351_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4052_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_246i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_246i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3850fs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3850fs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_4050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_4050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:konicaminolta:bizhub_c3100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c3100p:-:*:*:*:*:*:*:*"
] |
|
GHSA-hxp2-q48f-xhqg | SAP S/4 HANA (Financial Products Subledger and Banking Services), versions - FSAPPL 400, 450, 500 and S4FPSL 100, allows an authenticated user to run an analysis report due to Missing Authorization Check, resulting in slowing the system. | [] |
|
GHSA-g9wm-8j5w-m9xc | The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function. | [] |
|
CVE-2009-2093 | SQL injection vulnerability in the console in IBM WebSphere Partner Gateway (WPG) Enterprise 6.0 before FP8, 6.1 before FP3, 6.1.1 before FP2, and 6.2 before FP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:fp7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.1.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.2:*:enterprise:*:*:*:*:*"
] |
|
GHSA-xrx4-x2w9-xf6v | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MD Jakir Hosen Tiger Forms – Drag and Drop Form Builder plugin <= 2.0.0 versions. | [] |
|
GHSA-mmhq-pg6g-xrxc | Mafia Blog .4 BETA does not properly protect the admin directory, which allows remote attackers to execute arbitrary PHP code by using writeinfo.php to inject the code into info.php. | [] |
|
CVE-2014-7575 | The eBiblio Andalucia (aka com.bqreaders.reader.ebiblioandalucia) application 1.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:ebiblio:ebiblio_andalucia:1.6.5:*:*:*:*:android:*:*"
] |
|
GHSA-77gr-pj6j-w9f8 | Server-Side Request Forgery (SSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 3.7.56. | [] |
|
CVE-2016-9682 | The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. | [
"cpe:2.3:o:dell:sonicwall_secure_remote_access_server:8.1.0.2-14sv:*:*:*:*:*:*:*"
] |
|
GHSA-x79p-2mvq-597f | Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.