Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-hp57-8q89-468c
Cross-site request forgery (CSRF) vulnerability in Cisco FireSIGHT System Software 5.4.1.2 and 6.0.0 in FireSIGHT Management Center allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu94721.
[]
CVE-2018-15444
Cisco Energy Management Suite XML External Entity Vulnerability
A vulnerability in the web-based user interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by convincing a user of an affected system to import a crafted XML file with malicious entries, which could allow the attacker to read and write files within the affected application.
[ "cpe:2.3:a:cisco:energy_management_suite_software:-:*:*:*:*:*:*:*" ]
GHSA-f3jr-rvxv-mh4w
Multiple SQL injection vulnerabilities in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allow remote administrators to execute arbitrary SQL commands via unspecified vectors.
[]
GHSA-h9fm-r36v-gmw8
WonderCMS 3.1.3 is affected by cross-site scripting (XSS) in the Admin Panel. An attacker can inject the XSS payload in Page keywords and each time any user will visit the website, the XSS triggers, and the attacker can able to steal the cookie according to the crafted payload.
[]
CVE-2018-17770
Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.
[ "cpe:2.3:o:ingenico:telium_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ingenico:telium_2:-:*:*:*:*:*:*:*" ]
GHSA-jf69-ffp6-3g7g
A potential security vulnerability has been identified in HP UCMDB Configuration Manager versions 10.10, 10.11, 10.20, 10.21, 10.22, 10.23. These vulnerabilities could be remotely exploited to allow code execution.
[]
GHSA-6wm8-q34j-2mc2
An issue was discovered in Open5gs v2.7.2. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of gmm_state_exception() function upon receipt of the Nausf_UEAuthentication_Authenticate response.
[]
CVE-2023-1037
SourceCodester Dental Clinic Appointment Reservation System POST Parameter login.php sql injection
A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /APR/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221795.
[ "cpe:2.3:a:dental_clinic_appointment_reservation_system_project:dental_clinic_appointment_reservation_system:1.0:*:*:*:*:*:*:*" ]
GHSA-43qp-56c9-mg75
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17111.
[]
GHSA-52f2-j43x-hh76
On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX series routers can result in a PFE (Packet Forwarding Engine) hang or crash.
[]
GHSA-5hv5-7p47-rvcp
In Content Resolver, there is a possible method to access metadata about existing content providers on the device due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
CVE-2021-38646
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*" ]
CVE-2021-29369
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
[ "cpe:2.3:a:gnuplot_project:gnuplot:*:*:*:*:*:node.js:*:*" ]
CVE-2009-4015
Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allows remote attackers to execute arbitrary commands via shell metacharacters in filename arguments.
[ "cpe:2.3:a:debian:lintian:1.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.26:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.27:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.23.28:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:1.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.0-rc1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.0-rc2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:lintian:2.3.1:*:*:*:*:*:*:*" ]
CVE-2006-6990
Cross-domain vulnerability in Enigma Browser 3.8.8 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.
[ "cpe:2.3:a:advanced_search_technologies_inc.:enigma_browser:3.8.8:*:*:*:*:*:*:*" ]
GHSA-3qqv-wmpg-38v7
get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.
[]
CVE-2022-43679
The Docker image of ownCloud Server through 10.11 contains a misconfiguration that renders the trusted_domains config useless. This could be abused to spoof the URL in password-reset e-mail messages.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*" ]
CVE-2022-31948
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/classes/Master.php?f=delete_report.
[ "cpe:2.3:a:rescue_dispatch_management_system_project:rescue_dispatch_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2023-28388
Uncontrolled search path element in some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:chipset_device_software:*:*:*:*:*:*:*:*" ]
CVE-2024-6410
ProfileGrid <= 5.8.9 - Authenticated (Subscriber+) Insecure Direct Object Reference
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.8.9 via the 'pm_upload_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the profile picture of any user.
[ "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:*:*:*" ]
GHSA-rx2m-xr4x-54hh
usememos/memos vulnerable to Improper Authorization
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
[]
GHSA-83q6-vf2m-vc99
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5588, and CVE-2015-6677.
[]
GHSA-8v75-gpj5-x889
SQL injection vulnerability in read.php3 and other scripts in Phorum 3.0.7 allows remote attackers to execute arbitrary SQL queries via the sSQL parameter.
[]
CVE-2018-0144
A vulnerability in the web-based management interface of Cisco Prime Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvg81051.
[ "cpe:2.3:a:cisco:prime_data_center_network_manager:10.4\\(1.109\\):*:*:*:*:*:*:*" ]
CVE-2019-19052
A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*" ]
GHSA-rrp8-8j9r-pxg2
In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, while processing a StrHwPlatform with length smaller than EFICHIPINFO_MAX_ID_LENGTH, an array out of bounds access may occur.
[]
CVE-2021-20379
IBM Guardium Data Encryption (GDE) 3.0.0.3 and 4.0.0.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 195711.
[ "cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:guardium_data_encryption:4.0.0.4:*:*:*:*:*:*:*" ]
GHSA-4xx3-xg55-3wr5
Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
GHSA-3cgr-wxhv-h7xw
LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5.
[]
GHSA-4683-gq97-9p3g
Secure Internet Live Conferencing (SILC) 0.9.11 and 0.9.12 stores passwords and sessions in plaintext in memory, which could allow local users to obtain sensitive information.
[]
CVE-2022-33306
Buffer over-read in WLAN
Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs.
[ "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca2062:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9986:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6102_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6102:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9001:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9002:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9003:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8cx_gen3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8cx_gen3:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
GHSA-5hv9-j8qv-9mvq
Adobe Animate version 21.0.9 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted FLA file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2014-9201
Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
[ "cpe:2.3:h:beckwithelectric:m-2001d_digital_tapchanger_control:-:*:*:*:*:*:*:*", "cpe:2.3:h:beckwithelectric:m-6200_digital_voltage_regulator_control:-:*:*:*:*:*:*:*", "cpe:2.3:h:beckwithelectric:m-6200a_digital_voltage_regulator_control:-:*:*:*:*:*:*:*", "cpe:2.3:h:beckwithelectric:m-6280_digital_capacitor_bank_control:-:*:*:*:*:*:*:*", "cpe:2.3:h:beckwithelectric:m-6280a_digital_capacitor_bank_control:-:*:*:*:*:*:*:*", "cpe:2.3:h:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control:-:*:*:*:*:*:*:*", "cpe:2.3:o:beckwithelectric:m-2001d_digital_tapchanger_control_d-0214_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:beckwithelectric:m-6200_digital_voltage_regulator_control_d-0198_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:beckwithelectric:m-6200a_digital_voltage_regulator_control_d-0228_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:beckwithelectric:m-6280_digital_capacitor_bank_control_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:beckwithelectric:m-6280a_digital_capacitor_bank_control_d-0254_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control_d-0346_firmware:*:*:*:*:*:*:*:*" ]
GHSA-5rmf-p9h9-9cv3
WebKit in Apple iOS before 9 allows man-in-the-middle attackers to conduct redirection attacks by leveraging the mishandling of the resource cache of an SSL web site with an invalid X.509 certificate.
[]
CVE-2022-4767
Denial of Service in usememos/memos
Denial of Service in GitHub repository usememos/memos prior to 0.9.1.
[ "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*" ]
CVE-2016-0398
IBM Cognos Analytics (CA) 11.0 before 11.0.2 allows remote attackers to conduct content-spoofing attacks via a crafted URL.
[ "cpe:2.3:a:ibm:cognos_analytics:11.0.0:*:*:*:*:*:*:*" ]
GHSA-fc89-33h9-mh65
An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices. Cached credentials are not erased from an access point returning wirelessly from a disconnected state. This may provide unintended network access.
[]
GHSA-gjqm-xj5v-7cvf
Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
[]
GHSA-p3xm-vpj8-m644
An exploitable code execution vulnerability exists in the BMP image rendering functionality of SDL2_image-2.0.2. A specially crafted BMP image can cause a stack overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
[]
CVE-2012-4451
Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.
[ "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
GHSA-fw5p-r5cw-5r92
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1200, CVE-2020-1210, CVE-2020-1453, CVE-2020-1576, CVE-2020-1595.
[]
CVE-2007-0750
Integer overflow in CoreGraphics in Apple Mac OS X 10.4 up to 10.4.9 allows remote user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted PDF file.
[ "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*" ]
CVE-2019-3706
Web Interface Authentication Bypass Vulnerability
Dell EMC iDRAC9 versions prior to 3.24.24.24, 3.21.26.22, 3.22.22.22 and 3.21.25.22 contain an authentication bypass vulnerability. A remote attacker may potentially exploit this vulnerability to bypass authentication and gain access to the system by sending specially crafted data to the iDRAC web interface.
[ "cpe:2.3:o:dell:idrac9_firmware:3.20.21.20:*:*:*:*:*:*:*", "cpe:2.3:o:dell:idrac9_firmware:3.21.24.22:*:*:*:*:*:*:*", "cpe:2.3:o:dell:idrac9_firmware:3.23.23.23:*:*:*:*:*:*:*" ]
GHSA-rhv8-c8mx-v4h4
Under certain mode of operations, HLOS may be able get direct or indirect access through DXE channels to tamper with the authenticated WCNSS firmware stored in DDR because DXE-accessible memory is located within the authenticated image in Snapdragon Mobile and Snapdragon Wear in version MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 617.
[]
GHSA-m8hp-crh9-hrrf
Online Diagnostic Lab Management System version 1.0 remote exploit that bypasses login with SQL injection and then uploads a shell.
[]
CVE-2011-0670
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
CVE-2022-22538
When a user opens a manipulated Adobe Illustrator file format (.ai, ai.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
GHSA-2wvj-9m7h-43j3
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
[]
GHSA-cw5g-6vjh-8wpg
The IBM WebSphere DataPower XML Accelerator XA35, Low Latency Appliance XM70, Integration Appliance XI50, B2B Appliance XB60, and XML Security Gateway XS40 SOA Appliances before 3.8.0.0, when a QLOGIC Ethernet interface is used, allow remote attackers to cause a denial of service (interface outage) via malformed ICMP packets to the 0.0.0.0 destination IP address.
[]
GHSA-mcw3-phf9-3frr
Ashlar-Vellum Cobalt Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17985.
[]
CVE-2007-3923
The Common Internet File System (CIFS) optimization in Cisco Wide Area Application Services (WAAS) 4.0.7 and 4.0.9, as used by Cisco WAE appliance and the NM-WAE-502 network module, when Edge Services are configured, allows remote attackers to cause a denial of service (loss of service) via a flood of TCP SYN packets to port (1) 139 or (2) 445.
[ "cpe:2.3:h:cisco:wide_area_application_engine:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wide_area_application_engine_nm-wae-502:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wide_area_application_services:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wide_area_application_services:4.0.9:*:*:*:*:*:*:*" ]
CVE-2025-22556
WordPress Norse Rune Oracle plugin <= 1.4.1 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Greg Whitehead Norse Rune Oracle Plugin allows Cross Site Request Forgery.This issue affects Norse Rune Oracle Plugin: from n/a through 1.4.1.
[]
GHSA-5rm6-jff6-vg9v
An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data.
[]
CVE-2007-0713
Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie file.
[ "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*" ]
GHSA-rvp7-wrjj-rgvf
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567.
[]
GHSA-q728-88fr-65v3
A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
[]
GHSA-hfxr-3rpj-gp54
The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors.
[]
CVE-2013-2160
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
[ "cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*" ]
GHSA-4gmc-62g5-x8wf
Cross-site scripting (XSS) vulnerability in the Web Links module 6.x-2.x before 6.x-2.6 and 7.x-1.x before 7.x-1.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors.
[]
GHSA-cc9g-8gq4-65mp
An exploitable information disclosure vulnerability exists in the way Nitro Pro 13.9.1.155 does XML error handling. A specially crafted PDF document can cause uninitialized memory access resulting in information disclosure. In order to trigger this vulnerability, victim must open a malicious file.
[]
CVE-2023-46424
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_422BD4 function.
[ "cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*" ]
GHSA-rwff-5xh4-69fc
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Reader::getU30().
[]
CVE-2017-18515
The wp-statistics plugin before 12.0.8 for WordPress has SQL injection.
[ "cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-51906
WordPress RSV 360 View plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rapid Sort RSV 360 View allows DOM-Based XSS.This issue affects RSV 360 View: from n/a through 1.0.
[]
CVE-2014-6289
The Ajax dispatcher for Extbase in the Yet Another Gallery (yag) extension before 3.0.1 and Tools for Extbase development (pt_extbase) extension before 1.5.1 allows remote attackers to bypass access restrictions and execute arbitrary controller actions via unspecified vectors.
[ "cpe:2.3:a:daniel_lienert:yet_another_gallery:*:*:*:*:*:typo3:*:*", "cpe:2.3:a:michael_knoll:tools_for_extbase_developmen:*:*:*:*:*:typo3:*:*" ]
GHSA-p3rq-cm49-f76p
Data corruption vulnerability in firmware in Intel Solid-State Drive Consumer, Professional, Embedded, Data Center affected firmware versions LSBG200, LSF031C, LSF036C, LBF010C, LSBG100, LSF031C, LSF036C, LBF010C, LSF031P, LSF036P, LBF010P, LSF031P, LSF036P, LBF010P, LSMG200, LSF031E, LSF036E, LSMG100, LSF031E, LSF036E, LSDG200, LSF031D, LSF036D allows local users to cause a denial of service via unspecified vectors.
[]
CVE-2009-4215
Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.
[ "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:32-bit:*:*:*:*:*", "cpe:2.3:a:pandasecurity:panda_antivirus:2010:*:pro:*:*:*:*:*", "cpe:2.3:a:pandasecurity:panda_global_protection:2010:*:*:*:*:*:*:*", "cpe:2.3:a:pandasecurity:panda_internet_security:2010:*:pro:*:*:*:*:*" ]
CVE-2024-57933
gve: guard XSK operations on the existence of queues
In the Linux kernel, the following vulnerability has been resolved: gve: guard XSK operations on the existence of queues This patch predicates the enabling and disabling of XSK pools on the existence of queues. As it stands, if the interface is down, disabling or enabling XSK pools would result in a crash, as the RX queue pointer would be NULL. XSK pool registration will occur as part of the next interface up. Similarly, xsk_wakeup needs be guarded against queues disappearing while the function is executing, so a check against the GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the disabling of the bit and the synchronize_net() in gve_turndown.
[]
GHSA-hg8f-7r33-vp6x
Improper sanitization of incoming intent in Dressroom prior to SMR Jan-2022 Release 1 allows local attackers to read and write arbitrary files without permission.
[]
CVE-2022-2993
bt: host: Wrong key validation check
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
[ "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*" ]
GHSA-jp26-88mw-89qr
sigstore-java has a vulnerability with bundle verification
Summarysigstore-java has insufficient verification for a situation where a bundle provides a invalid signature for a checkpoint.ImpactThis bug impacts clients using any variation of KeylessVerifier.verify()Currently checkpoints are only used to ensure the root hash of an inclusion proof was provided by the log in question. Failing to validate that means a bundle may provide an inclusion proof that doesn't actually correspond to the log in question. This may eventually lead a monitor/witness being unable to detect when a compromised logs are providing different views of themselves to different clients.There are other mechanisms right now that mitigate this, such as the signed entry timestamp. Sigstore-java currently requires a valid signed entry timestamp. By correctly verifying the signed entry timestamp we can make certain assertions about the log signing the log entry (like the log was aware of the artifact signing event and signed it). Therefore the impact on clients that are not monitors/witnesses is very low.All cryptographic materials and identity information in the bundle must still be verified for the verification to pass. A valid signed entry timestamp is still required for verification to pass.sigstore-gradle-plugin and sigstore-maven-plugin are not affected by this as they only provide signing functionality.Steps To ReproduceBuild the java sigstore-cli at v1.1.0Create some random blob and sign itModify the checkpoint signature on the bundle, this is the last base64 section in the checkpoint, the following diff just swaps changes the last 3 base64 characters to aaa.PatchesPatched in v1.2.0 release (patch: https://github.com/sigstore/sigstore-java/commit/23fb4885e6704a5df4977f7acf253a745349edf9) Conformance tests added https://github.com/sigstore/sigstore-conformance/pull/139WorkaroundsVerifiers may chose to verify the checkpoint manually after running `KeylessVerifier.verify()`
[]
CVE-2008-3037
Cross-site scripting (XSS) vulnerability in the Address Directory (sp_directory) extension 0.2.10 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:typo3:address_directory:*:*:*:*:*:*:*:*" ]
CVE-2021-24348
Side Menu < 3.1.5 - Authenticated (admin+) SQL Injection
The menu delete functionality of the Side Menu – add fixed side buttons WordPress plugin before 3.1.5, available to Administrator users takes the did GET parameter and uses it into an SQL statement without proper sanitisation, validation or escaping, therefore leading to a SQL Injection issue
[ "cpe:2.3:a:wow-estore:side_menu:*:*:*:*:*:wordpress:*:*" ]
GHSA-vmxg-xhmf-mrv5
selinux-policy as packaged in Red Hat OpenShift 2 allows attackers to obtain process listing information via a privilege escalation attack.
[]
GHSA-367j-phrj-8hv2
IBM WebSphere Portal 6.0.0.x through 6.0.0.1, 6.0.1.x through 6.0.1.7, 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF26, and 8.0.0.x through 8.0.0.1 CF08 allows remote attackers to obtain sensitive Java Content Repository (JCR) information via a modified Web Content Manager (WCM) URL.
[]
CVE-2024-32723
WordPress Advanced Floating Content plugin <= 1.2.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Tides Advanced Floating Content allows Stored XSS.This issue affects Advanced Floating Content: from n/a through 1.2.5.
[]
CVE-2017-14306
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000006e10."
[ "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*" ]
GHSA-hqhf-8jgc-h5hx
Magento 2 Community Edition Path Traversal Vulnerability
A path traversal vulnerability in the WYSIWYG editor for Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could result in unauthorized access to uploaded images due to insufficient access control.
[]
GHSA-jx5x-5x47-rh28
In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
[]
CVE-2012-2080
Cross-site request forgery (CSRF) vulnerability in the Node Limit Number module before 6.x-1.2 for Drupal allows remote attackers to hijack the authentication of users with the administer node limitnumber permission for requests that delete limits.
[ "cpe:2.3:a:node_limit_number_project:node_limitnumber:*:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.1-2:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.1-3:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:5.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:node_limit_number_project:node_limitnumber:6.x-2.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
GHSA-wx67-2xhp-3w8f
The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input.
[]
CVE-2023-30253
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*" ]
CVE-2024-32965
ssrf vulnerability in lobe-chat
Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*" ]
GHSA-pmqw-p3fw-qvp9
PHP remote file inclusion vulnerability in index.php in Longino Jacome php-Revista 1.1.2 allows remote attackers to execute arbitrary PHP code via the adodb parameter.
[]
GHSA-w993-3vv8-hxp8
In the Linux kernel, the following vulnerability has been resolved:kunit: Fix potential null dereference in kunit_device_driver_test()kunit_kzalloc() may return a NULL pointer, dereferencing it without NULL check may lead to NULL dereference. Add a NULL check for test_state.
[]
CVE-2014-7475
The Ionic View (aka com.ionic.viewapp) application 0.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:drifty:ionic_view:0.0.2:*:*:*:*:android:*:*" ]
GHSA-j8rg-4hjm-8r95
Path traversal vulnerability in Jenkins Publish Over SSH Plugin
Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.
[]
GHSA-xfwm-3cfp-v279
tss 0.8.1 allows local users to read arbitrary files via the -a parameter, which is processed while tss is running with privileges.
[]
GHSA-74vx-9hfr-h68r
LG Electronics Mobile WiFi router L-09C, L-03E, and L-04D does not restrict access to the web administration interface, which allows remote attackers to obtain sensitive information via unspecified vectors.
[]
CVE-2024-12026
Message Filter for Contact Form 7 <= 1.6.3 - Missing Authorization to Authenticated (Subscriber+) New Filter Creation
The Message Filter for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the saveFilter() function in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new filters.
[]
CVE-2021-20870
Improper handling of exceptional conditions vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, bizhub 4752/4052 GC9-X4 and earlier, bizhub C3850/C3350/3850FS, bizhub 4750/4050, bizhub C3110, bizhub C3100P) allows a physical attacker to obtain unsent scanned image data when scanned data transmission is stopped due to the network error by ejecting a HDD before the scan job times out.
[ "cpe:2.3:o:konicaminolta:bizhub_c750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c250i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c257i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c257i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_306i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_306i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_266i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_266i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_226i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_226i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c759_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c759:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c659_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c659:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c658_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c658:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_958_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_808_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_758_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_658e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_658e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c258_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c754e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c654e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_754e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_754e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_654e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_654e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c554e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c554e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c454e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c454e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c364e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c364e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c284e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c284e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c224e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c224e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_554e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_554e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_454e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_454e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_364e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_364e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_284e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_284e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_224e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_224e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c554_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c454_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c364_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c284_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3350i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3350i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4000i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4000i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3320i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3320i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4700i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4700i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851fs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851fs:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3351:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4752:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4052_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4052:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_246i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_246i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3850:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3850fs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3850fs:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4750:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3110:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3100p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3100p:-:*:*:*:*:*:*:*" ]
GHSA-hxp2-q48f-xhqg
SAP S/4 HANA (Financial Products Subledger and Banking Services), versions - FSAPPL 400, 450, 500 and S4FPSL 100, allows an authenticated user to run an analysis report due to Missing Authorization Check, resulting in slowing the system.
[]
GHSA-g9wm-8j5w-m9xc
The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
[]
CVE-2009-2093
SQL injection vulnerability in the console in IBM WebSphere Partner Gateway (WPG) Enterprise 6.0 before FP8, 6.1 before FP3, 6.1.1 before FP2, and 6.2 before FP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:*:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:fp7:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.0:*:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:*:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:fp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.2:*:enterprise:*:*:*:*:*" ]
GHSA-xrx4-x2w9-xf6v
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MD Jakir Hosen Tiger Forms – Drag and Drop Form Builder plugin <= 2.0.0 versions.
[]
GHSA-mmhq-pg6g-xrxc
Mafia Blog .4 BETA does not properly protect the admin directory, which allows remote attackers to execute arbitrary PHP code by using writeinfo.php to inject the code into info.php.
[]
CVE-2014-7575
The eBiblio Andalucia (aka com.bqreaders.reader.ebiblioandalucia) application 1.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:ebiblio:ebiblio_andalucia:1.6.5:*:*:*:*:android:*:*" ]
GHSA-77gr-pj6j-w9f8
Server-Side Request Forgery (SSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 3.7.56.
[]
CVE-2016-9682
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.
[ "cpe:2.3:o:dell:sonicwall_secure_remote_access_server:8.1.0.2-14sv:*:*:*:*:*:*:*" ]
GHSA-x79p-2mvq-597f
Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
[]