id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2017-8822 | In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, relays (that have incompletely downloaded descriptors) can pick themselves in a circuit path, leading to a degradation of anonymity, aka TROVE-2017-012. | [
"cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-37v5-vmq6-f37g | In the Linux kernel, the following vulnerability has been resolved:net_sched: Prevent creation of classes with TC_H_ROOTThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal. | [] |
|
GHSA-52p7-742f-7qm9 | Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to float removal. | [] |
|
CVE-2025-21259 | Microsoft Outlook Spoofing Vulnerability | Microsoft Outlook Spoofing Vulnerability | [] |
CVE-2019-18588 | Dell EMC Unisphere for PowerMax versions prior to 9.1.0.9, Dell EMC Unisphere for PowerMax versions prior to 9.0.2.16, and Dell EMC PowerMax OS 5978.221.221 and 5978.479.479 contain a Cross-Site Scripting (XSS) vulnerability. An authenticated malicious user may potentially exploit this vulnerability to inject javascript code and affect other authenticated users' sessions. | [
"cpe:2.3:a:dell:emc_powermax:5978.221.221:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_powermax:5978.479.479:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_unisphere_for_powermax:*:*:*:*:*:*:*:*"
] |
|
GHSA-qg39-p6xp-j59x | Stack-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid UncompressedQuickTimeData opcode length in a PICT image. | [] |
|
CVE-2021-27147 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / admin credentials for an ISP. | [
"cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-33327 | WordPress Leyka plugin <= 3.30.2 - Privilege Escalation vulnerability | Improper Privilege Management vulnerability in Teplitsa of social technologies Leyka allows Privilege Escalation.This issue affects Leyka: from n/a through 3.30.2. | [
"cpe:2.3:a:teplitsa_of_social_technologies:leyka:*:*:*:*:*:*:*:*"
] |
GHSA-wx3j-8h4r-qj57 | IIS 4.05 and 5.0 allow remote attackers to cause a denial of service via a long, complex URL that appears to contain a large number of file extensions, aka the "Malformed Extension Data in URL" vulnerability. | [] |
|
GHSA-ph2v-xqxg-m4w5 | The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site. | [] |
|
CVE-2012-1614 | Coppermine Photo Gallery before 1.5.20 allows remote attackers to obtain sensitive information via (1) a direct request to plugins/visiblehookpoints/index.php, an invalid (2) page or (3) cat parameter to thumbnails.php, an invalid (4) page parameter to usermgr.php, or an invalid (5) newer_than or (6) older_than parameter to search.inc.php, which reveals the installation path in an error message. | [
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:b:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:b-nuke:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.3:rc:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.5.16:*:*:*:*:*:*:*"
] |
|
GHSA-pw8x-jjg5-pg2p | IBM MQ Operator 2.0.26 and 3.2.4 could allow an authenticated user in a specifically defined role, to bypass security restrictions and execute actions against the queue manager. | [] |
|
CVE-2007-4007 | PHP remote file inclusion vulnerability in index.php in Article Directory (Article Site Directory) allows remote attackers to execute arbitrary PHP code via a URL in the page parameter. | [
"cpe:2.3:a:article_directory:article_directory:*:*:*:*:*:*:*:*"
] |
|
GHSA-78q2-gpgm-j9wf | The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file. | [] |
|
GHSA-6ppv-9jp4-gprm | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags[WHAT & HOW]
"dcn20_validate_apply_pipe_split_flags" dereferences merge, and thus it
cannot be a null pointer. Let's pass a valid pointer to avoid null
dereference.This fixes 2 FORWARD_NULL issues reported by Coverity. | [] |
|
GHSA-7pq5-98ww-5q49 | An issue was discovered in New Media Smarty before 9.10. Passwords are stored in the database in an obfuscated format that can be easily reversed. The file data.mdb contains these obfuscated passwords in the second column. NOTE: this is unrelated to the popular Smarty template engine product. | [] |
|
GHSA-rq86-9m6r-cm3g | SurrealDB has uncaught exception in Net module that leads to database crash | A vulnerability was found where an attacker can crash the database via crafting a HTTP query that returns a null byte. The problem relies on an uncaught exception in the `net` module, where the result of the query will be converted to JSON before showing as the HTTP response to the user in the **/sql** endpoint.ImpactThis vulnerability allows any authenticated user to crash a SurrealDB instance by sending a crafted query with a null byte to the /sql endpoint.Where SurrealDB is used as an application backend, it is possible that an application user can crash the SurrealDB instance and thus the supported application through crafted inputs that exploit this attack vector.PatchesA patch has been introduced that ensures the error is caught and converted as an error.Versions 2.2.2, 2.1.5 and 2.0.5 and later are not affected by this isssueWorkaroundsAffected users who are unable to update may want to limit the ability of untrusted clients to run arbitrary queries in the affected versions of SurrealDB. To limit the impact of the denial of service, SurrealDB administrators may also want to ensure that the SurrealDB process is running so that it can be automatically re-started after a crash.Where SurrealDB is used as an application backend, ensure sanitisation of input at the application layer to prevent injection attacks.Referenceshttps://github.com/surrealdb/surrealdb/pull/5647 | [] |
CVE-2023-26865 | SQL injection vulnerability found in PrestaShop bdroppy v.2.2.12 and before allowing a remote attacker to gain privileges via the BdroppyCronModuleFrontController::importProducts component. | [
"cpe:2.3:a:brandsdistribution:bdroppy:*:*:*:*:*:prestashop:*:*"
] |
|
CVE-2022-21402 | Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-15944 | In Counter-Strike: Global Offensive before 8/29/2019, community game servers can display unsafe HTML in a disconnection message. | [
"cpe:2.3:a:valvesoftware:counter-strike\\:global_offensive:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-8613 | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, tvOS 12.3, watchOS 5.2.1. A remote attacker may be able to cause arbitrary code execution. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-39082 | In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
GHSA-8cw5-3844-5574 | Unspecified vulnerability in the JASS script interpreter in Warcraft III: The Frozen Throne 1.24b and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted custom map. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2024-38230 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"
] |
GHSA-263p-cpjv-v642 | Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution. | [] |
|
GHSA-9xg8-22rr-c6vh | Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user. | [] |
|
GHSA-j5xf-gv89-g422 | Moodle Cross-site Scripting vulnerability | Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk. | [] |
CVE-2024-21978 | Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption. | [
"cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*"
] |
|
GHSA-mwwm-v9vx-c276 | The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3. | [] |
|
CVE-2020-8355 | An internal product security audit of Lenovo XClarity Administrator (LXCA) prior to version 3.1.0 discovered the Windows OS credentials provided by the LXCA user to perform driver updates of managed systems may be captured in the First Failure Data Capture (FFDC) service log if the service log is generated while managed endpoints are updating. The service log is only generated when requested by a privileged LXCA user and it is only accessible to the privileged LXCA user that requested the file and is then deleted. | [
"cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*"
] |
|
GHSA-4rjf-927h-4fjw | An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability. | [] |
|
CVE-2025-29819 | Windows Admin Center in Azure Portal Information Disclosure Vulnerability | External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally. | [] |
CVE-2001-1193 | Directory traversal vulnerability in EFTP 2.0.8.346 allows local users to read directories via a ... (modified dot dot) in the CWD command. | [
"cpe:2.3:a:khamil_landross_and_zack_jones:eftp:2.0.8.346:*:*:*:*:*:*:*"
] |
|
GHSA-hh3w-5666-ggp2 | The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration. | [] |
|
GHSA-4j76-6ggr-2p88 | Integer overflow in libavcodec/mpeg12dec.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file. | [] |
|
GHSA-97hh-gf3f-pjg6 | PHP Scripts Mall Website Seller Script 2.0.3 has CSRF via user_submit.php?upd=2, with resultant XSS. | [] |
|
GHSA-wr22-x6h6-rwqh | Stack-based buffer overflow in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows attackers to execute arbitrary code via a long DASPROF and possibly other environment variables, which are copied into the buildDasPaths buffer. | [] |
|
CVE-2022-32013 | Complete Online Job Search System v1.0 is vulnerable to SQL Injection via eris/admin/category/index.php?view=edit&id=. | [
"cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-4689 | IBM Security Guardium 11.2 is vulnerable to CVS Injection. A remote privileged attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-ForceID: 186696. | [
"cpe:2.3:a:ibm:security_guardium:11.2:*:*:*:*:*:*:*"
] |
|
GHSA-87wj-wph2-98g5 | A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution. | [] |
|
CVE-2022-3028 | A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-cqvp-qf4w-3mpx | Missing Authorization vulnerability in WPExperts Wholesale For WooCommerce.This issue affects Wholesale For WooCommerce: from n/a through 2.3.0. | [] |
|
GHSA-46p5-2v62-6rxc | Cross-Site Request Forgery (CSRF) vulnerability in No-nonsense Labs Document & Data Automation allows Stored XSS.This issue affects Document & Data Automation: from n/a through 1.6.1. | [] |
|
CVE-2019-20470 | An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.8656 devices. It performs actions based on certain SMS commands. This can be used to set up a voice communication channel from the watch to any telephone number, initiated by sending a specific SMS and using the default password, e.g., pw,<password>,call,<mobile_number> triggers an outbound call from the watch. The password is sometimes available because of CVE-2019-20471. | [
"cpe:2.3:o:tk-star:q90_junior_gps_horloge_firmware:3.1042.9.8656:*:*:*:*:*:*:*",
"cpe:2.3:h:tk-star:q90_junior_gps_horloge:-:*:*:*:*:*:*:*"
] |
|
GHSA-3v83-crv9-cf9p | In the Linux kernel, the following vulnerability has been resolved:gtp: fix use-after-free and null-ptr-deref in gtp_newlink()The gtp_link_ops operations structure for the subsystem must be
registered after registering the gtp_net_ops pernet operations structure.Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:[ 1010.702740] gtp: GTP module unloaded
[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1
[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00
[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203
[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000
[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282
[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000
[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80
[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400
[ 1010.715953] FS: 00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000
[ 1010.715958] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0
[ 1010.715968] PKRU: 55555554
[ 1010.715972] Call Trace:
[ 1010.715985] ? __die_body.cold+0x1a/0x1f
[ 1010.715995] ? die_addr+0x43/0x70
[ 1010.716002] ? exc_general_protection+0x199/0x2f0
[ 1010.716016] ? asm_exc_general_protection+0x1e/0x30
[ 1010.716026] ? gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.716034] ? gtp_net_exit+0x150/0x150 [gtp]
[ 1010.716042] __rtnl_newlink+0x1063/0x1700
[ 1010.716051] ? rtnl_setlink+0x3c0/0x3c0
[ 1010.716063] ? is_bpf_text_address+0xc0/0x1f0
[ 1010.716070] ? kernel_text_address.part.0+0xbb/0xd0
[ 1010.716076] ? __kernel_text_address+0x56/0xa0
[ 1010.716084] ? unwind_get_return_address+0x5a/0xa0
[ 1010.716091] ? create_prof_cpu_mask+0x30/0x30
[ 1010.716098] ? arch_stack_walk+0x9e/0xf0
[ 1010.716106] ? stack_trace_save+0x91/0xd0
[ 1010.716113] ? stack_trace_consume_entry+0x170/0x170
[ 1010.716121] ? __lock_acquire+0x15c5/0x5380
[ 1010.716139] ? mark_held_locks+0x9e/0xe0
[ 1010.716148] ? kmem_cache_alloc_trace+0x35f/0x3c0
[ 1010.716155] ? __rtnl_newlink+0x1700/0x1700
[ 1010.716160] rtnl_newlink+0x69/0xa0
[ 1010.716166] rtnetlink_rcv_msg+0x43b/0xc50
[ 1010.716172] ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716179] ? lock_acquire+0x1fe/0x560
[ 1010.716188] ? netlink_deliver_tap+0x12f/0xd50
[ 1010.716196] netlink_rcv_skb+0x14d/0x440
[ 1010.716202] ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716208] ? netlink_ack+0xab0/0xab0
[ 1010.716213] ? netlink_deliver_tap+0x202/0xd50
[ 1010.716220] ? netlink_deliver_tap+0x218/0xd50
[ 1010.716226] ? __virt_addr_valid+0x30b/0x590
[ 1010.716233] netlink_unicast+0x54b/0x800
[ 1010.716240] ? netlink_attachskb+0x870/0x870
[ 1010.716248] ? __check_object_size+0x2de/0x3b0
[ 1010.716254] netlink_sendmsg+0x938/0xe40
[ 1010.716261] ? netlink_unicast+0x800/0x800
[ 1010.716269] ? __import_iovec+0x292/0x510
[ 1010.716276] ? netlink_unicast+0x800/0x800
[ 1010.716284] __sock_sendmsg+0x159/0x190
[ 1010.716290] ____sys_sendmsg+0x712/0x880
[ 1010.716297] ? sock_write_iter+0x3d0/0x3d0
[ 1010.716304] ? __ia32_sys_recvmmsg+0x270/0x270
[ 1010.716309] ? lock_acquire+0x1fe/0x560
[ 1010.716315] ? drain_array_locked+0x90/0x90
[ 1010.716324] ___sys_sendmsg+0xf8/0x170
[ 1010.716331] ? sendmsg_copy_msghdr+0x170/0x170
[ 1010.716337] ? lockdep_init_map
---truncated--- | [] |
|
CVE-2005-2361 | Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, (3) DOCSIS dissector, (4) SCTP graphs, (5) HTTP dissector, (6) DCERPC, (7) DHCP, (8) RADIUS dissector, (9) Telnet dissector, (10) IS-IS LSP dissector, or (11) NCP dissector in Ethereal 0.8.19 through 0.10.11 allows remote attackers to cause a denial of service (application crash or abort) via unknown attack vectors. | [
"cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*"
] |
|
GHSA-6fq3-98vm-9ffw | The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297. | [] |
|
CVE-2024-43395 | CraftOS-PC 2's improperly sanitizied paths cause filesystem escape (Windows) | CraftOS-PC 2 is a rewrite of the desktop port of CraftOS from the popular Minecraft mod ComputerCraft using C++ and a modified version of PUC Lua, as well as SDL for drawing. Prior to version 2.8.3, users of CraftOS-PC 2 on Windows can escape the computer folder and access files anywhere without permission or notice by obfuscating `..`s to bypass the internal check preventing parent directory traversal. Version 2.8.3 contains a patch for this issue. | [
"cpe:2.3:a:jackmacwindows:craftos-pc_2:*:*:*:*:*:*:*:*"
] |
GHSA-827g-rqf3-jrp6 | LuaExpat before 1.2.0 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. | [] |
|
CVE-2017-12269 | A vulnerability in the web UI of Cisco Spark Messaging Software could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web UI of the affected software. An attacker could exploit this vulnerability by injecting XSS content into the web UI of the affected software. A successful exploit could allow the attacker to force a user to execute code of the attacker's choosing or allow the attacker to retrieve sensitive information from the user. Cisco Bug IDs: CSCvf70587, CSCvf70592. | [
"cpe:2.3:a:cisco:spark:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-10564 | An issue was discovered in the File Upload plugin before 4.13.0 for WordPress. A directory traversal can lead to remote code execution by uploading a crafted txt file into the lib directory, because of a wfu_include_lib call. | [
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-8r7h-2v88-7fq5 | The Ice Age Village (aka com.gameloft.android.ANMP.GloftIAHM) application 2.8.0m for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2019-11413 | An issue was discovered in Artifex MuJS 1.0.5. It has unlimited recursion because the match function in regexp.c lacks a depth check. | [
"cpe:2.3:a:artifex:mujs:1.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-92w7-7jg2-c4rc | Security keys used by the terminal and NW for a session could be leaked in snapdragon mobile in versions MDM9650, MDM9655, SD 835, SDA660. | [] |
|
CVE-2009-1588 | Cross-site scripting (XSS) vulnerability in CGI RESCUE MiniBBS 8t before 8.95t, 8 before 8.95, 9 before 9.08, and 10 before 10.32 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:cgi_rescue:cgi_rescue_minibbs:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_rescue:cgi_rescue_minibbs:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_rescue:cgi_rescue_minibbs:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2012-4284 | A Privilege Escalation vulnerability exists in Viscosity 1.4.1 on Mac OS X due to a path name validation issue in the setuid-set ViscosityHelper binary, which could let a remote malicious user execute arbitrary code | [
"cpe:2.3:a:sparklabs:viscosity:1.4.1:*:*:*:*:macos:*:*"
] |
|
CVE-2017-17674 | BMC Remedy Mid Tier 9.1SP3 is affected by remote and local file inclusion. Due to the lack of restrictions on what can be targeted, the system can be vulnerable to attacks such as system fingerprinting, internal port scanning, Server Side Request Forgery (SSRF), or remote code execution (RCE). | [
"cpe:2.3:a:bmc:remedy_mid-tier:9.1:sp3:*:*:*:*:*:*"
] |
|
GHSA-6mr5-xh3f-7vqm | A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594. | [] |
|
CVE-2009-3885 | Sun Java SE 5.0 before Update 22 and 6 before Update 17 on Windows allows remote attackers to cause a denial of service via a BMP file containing a link to a UNC share pathname for an International Color Consortium (ICC) profile file, probably a related issue to CVE-2007-2789, aka Bug Id 6632445. | [
"cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0_0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0_10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-r5px-246v-9fm3 | SQL injection vulnerability in Ansel 2.1 and earlier allows remote attackers to modify SQL statements via the image parameter. | [] |
|
CVE-2017-5415 | An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
GHSA-cwf2-2rw3-x7wj | In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008208. | [] |
|
GHSA-85hm-w37j-fg2m | MetInfo 6.1.3 has XSS via the admin/index.php?a=dogetpassword langset parameter. | [] |
|
GHSA-xfmr-37vw-2xp2 | The LAM runtime environment package (lam-runtime-7.0.6-2mdk) on Mandrake Linux installs the mpi user without a password, which allows local users to gain privileges. | [] |
|
CVE-2023-40983 | A reflected cross-site scripting (XSS) vulnerability in the File Manager function of Webmin v2.100 allows attackers to execute malicious scripts via injecting a crafted payload into the Find in Results file. | [
"cpe:2.3:a:webmin:webmin:2.100:*:*:*:*:*:*:*"
] |
|
CVE-2020-9106 | HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) have a path traversal vulnerability. The system does not sufficiently validate certain pathname, successful exploit could allow the attacker access files and cause information disclosure. | [
"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-0343 | CVE-2023-0343 | Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages. | [
"cpe:2.3:o:akuvox:e11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:akuvox:e11:-:*:*:*:*:*:*:*"
] |
GHSA-4427-hxx6-cmx7 | Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 allows remote attackers to execute arbitrary code by uploading a file to /media/sda2 during a Wi-Fi session. | [] |
|
GHSA-4q76-mx33-p22x | In versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, BIG-IP ASM Configuration utility CSRF protection token can be reused multiple times. | [] |
|
GHSA-qf5h-v4fg-rm6j | In the Linux kernel, the following vulnerability has been resolved:accel/ivpu: Fix general protection fault in ivpu_bo_list()Check if ctx is not NULL before accessing its fields. | [] |
|
CVE-2017-9630 | An Improper Authentication issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The web server does not properly verify that provided authentication information is correct. | [
"cpe:2.3:o:pdqinc:laserwash_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserwash_g5_s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_g5_s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserwash_m5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserwash_360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserwash_360_plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_360_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserwash_autoxpress_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_autoxpress:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserwash_autoxpress_plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserwash_autoxpress_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:laserjet_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:laserjet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:protouch_tandem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:protouch_tandem:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:protouch_icon_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:protouch_icon:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pdqinc:protouch_autogloss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pdqinc:protouch_autogloss:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-40663 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of NIKON NIS-Elements Viewer 1.2100.1483.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF images. Crafted data in a TIF image can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15697. | [
"cpe:2.3:a:nikon:nis-elements_viewer:1.2100.1483.0:*:*:*:*:*:*:*"
] |
|
CVE-2012-3401 | The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0.1:*:*:*:*:*:*:*"
] |
|
CVE-1999-1590 | Directory traversal vulnerability in Muhammad A. Muquit wwwcount (Count.cgi) 2.3 allows remote attackers to read arbitrary GIF files via ".." sequences in the image parameter, a different vulnerability than CVE-1999-0021. | [
"cpe:2.3:a:wwwcount:wwwcount:2.3:*:*:*:*:*:*:*"
] |
|
GHSA-w2qq-x44h-xp8c | Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Privilege Escalation.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.12, from 2023.1.0 before 2023.1.7, from 2024.0.0 before 2024.0.3. | [] |
|
CVE-2022-46145 | authentik vulnerable to unauthorized user creation and potential account takeover | authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified password recovery, this can be used to overwrite the email address of admin accounts and take over their accounts. authentik 2022.11.2 and 2022.10.2 fix this issue. As a workaround, a policy can be created and bound to the `default-user-settings-flow flow` with the contents `return request.user.is_authenticated`. | [
"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*"
] |
GHSA-6r46-vvmw-c9mc | In BIND Supported Preview Edition, an error in the nxdomain-redirect feature can occur in versions which support EDNS Client Subnet (ECS) features. In those versions which have ECS support, enabling nxdomain-redirect is likely to lead to BIND exiting due to assertion failure. Versions affected: BIND Supported Preview Edition version 9.10.5-S1 -> 9.11.5-S5. ONLY BIND Supported Preview Edition releases are affected. | [] |
|
CVE-2017-6914 | CSRF exists in BigTree CMS 4.1.18 and 4.2.16 with the id parameter to the admin/ajax/users/delete/ page. A user can be deleted. | [
"cpe:2.3:a:bigtreecms:bigtree_cms:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.2.16:*:*:*:*:*:*:*"
] |
|
GHSA-93wg-xwmv-p4gv | In verifyIntentFiltersIfNeeded of PackageManagerService.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150038428 | [] |
|
GHSA-8884-7rm9-mrx4 | Magento stored Cross-Site Scripting (XSS) vulnerability | Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. | [] |
GHSA-7phm-83x9-wc8q | Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality. | [] |
|
CVE-2019-9508 | Vertiv Avocent UMG-4000 version 4.2.1.19 web interface is vulnerable to stored cross site scripting | The web interface of the Vertiv Avocent UMG-4000 version 4.2.1.19 is vulnerable to stored XSS. A remote attacker authenticated with an administrator account could store a maliciously named file within the web application that would execute each time a user browsed to the page. | [
"cpe:2.3:o:vertiv:avocent_umg-4000_firmware:4.2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:h:vertiv:avocent_umg-4000:-:*:*:*:*:*:*:*"
] |
GHSA-43wh-669h-5r23 | Cross-Site Request Forgery (CSRF) vulnerability in Reservation.Studio Reservation.Studio widget plugin <= 1.0.11 versions. | [] |
|
CVE-2016-3057 | Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.2 before 5020500_14 and 5.2 06 before 5020602_1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"
] |
|
CVE-2019-9270 | In the Android kernel in unifi and r8180 WiFi drivers there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-3708 | Several themes for WordPress by DeoThemes are vulnerable to Reflected Cross-Site Scripting via breadcrumbs in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:deothemes:medikaid:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-cmcj-43v4-7269 | Skyworth GN542VF Boa version 0.94.13 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. | [] |
|
CVE-2025-0492 | D-Link DIR-823X FUN_00412244 null pointer dereference | A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2016-1620 | Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-24983 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. | [] |
CVE-2020-28656 | The update functionality of the Discover Media infotainment system in Volkswagen Polo 2019 vehicles allows physically proximate attackers to execute arbitrary code because some unsigned parts of a metainfo file are parsed, which can cause attacker-controlled files to be written to the infotainment system and executed as root. | [
"cpe:2.3:o:vw:polo_firmware:2019:*:*:*:*:*:*:*",
"cpe:2.3:h:vw:polo:-:*:*:*:*:*:*:*"
] |
|
GHSA-r4m7-rxm5-ww7r | SQL injection vulnerability in index.php in PHP Coupon Script 3.0 allows remote attackers to execute arbitrary SQL commands via the bus parameter in a viewbus page. | [] |
|
GHSA-fx8w-4hhx-chxq | The engine installer in Novell Identity Manager (aka IDM) 3.6.1 stores admin tree credentials in /tmp/idmInstall.log, which allows local users to obtain sensitive information by reading this file. | [] |
|
GHSA-jcj4-h2pg-j964 | osTicket allows remote attackers to view sensitive uploaded files and possibly execute arbitrary code via an HTTP request that uploads a PHP file to the ticket attachments directory. | [] |
|
GHSA-mq2m-3xvq-7j47 | In Srelay (the SOCKS proxy and Relay) v.0.4.8p3, a specially crafted network payload can trigger a denial of service condition and disrupt the service. | [] |
|
CVE-2019-20718 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D8500 before 1.0.3.43, R6250 before 1.0.4.34, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R7100LG before 1.0.0.48, R7300DST before 1.0.0.68, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, and R8500 before 1.0.2.128. | [
"cpe:2.3:o:netgear:d6220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-7768 | Prototype Pollution | The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. | [
"cpe:2.3:a:grpc:grpc:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*"
] |
GHSA-43r3-p9qg-f74p | Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. | [] |
|
CVE-2014-9487 | The getid3 library in MediaWiki before 1.24.1, 1.23.8, 1.22.15 and 1.19.23 allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. NOTE: Related to CVE-2014-2053. | [
"cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*"
] |
|
GHSA-gp6x-x64p-2cpc | Improper input validation in firmware for some Intel(R) FPGA products before version 2.9.1 may allow denial of service. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.