Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-cp77-jfvp-qpxx
SQL injection vulnerability in request.cgi in Synology SafeAccess before 1.2.3-0234 allows remote attackers to execute arbitrary SQL commands via the domain parameter.
[]
GHSA-vpqg-xp9m-fhv7
Varnish HTTP cache before 3.0.4: ACL bug
[]
GHSA-r6v8-x996-x362
The Location Weather WordPress plugin before 1.3.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
CVE-2023-28990
WordPress Viral Mag theme <= 1.0.9 - Authenticated Arbitrary Plugin Activation Vulnerability
Missing Authorization vulnerability in HashThemes Viral Mag allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Viral Mag: from n/a through 1.0.9.
[]
GHSA-w97x-j6rg-55v5
Password stored in plain text by Jenkins Proxmox Plugin
Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[]
GHSA-m2r5-w7hg-5233
The ReadGIFImage function in coders/gif.c in ImageMagick before 6.7.8-8 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted comment in a GIF image.
[]
CVE-2020-16150
A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length.
[ "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
CVE-2019-15273
Cisco TelePresence Collaboration Endpoint Software Arbitrary File Overwrite Vulnerabilities
Multiple vulnerabilities in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to overwrite arbitrary files. The vulnerabilities are due to insufficient permission enforcement. An attacker could exploit these vulnerabilities by authenticating as the remote support user and submitting malicious input to specific commands. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying filesystem. The attacker has no control over the contents of the data written to the file. Overwriting a critical file could cause the device to crash, resulting in a denial of service condition (DoS).
[ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*" ]
GHSA-m384-cq33-7m7m
The iTunes Store component in Apple iOS before 9 does not properly delete AppleID credentials from the keychain upon a signout action, which might allow physically proximate attackers to obtain sensitive information via unspecified vectors.
[]
GHSA-23q3-qw5q-8658
If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
[]
GHSA-c5g5-37rh-vqmp
Cross-site scripting (XSS) vulnerability in Opera 9 and 10 allows remote attackers to inject arbitrary web script or HTML via a (1) RSS or (2) Atom feed, related to the rendering of the application/rss+xml content type as "scripted content." NOTE: the vendor reportedly considers this behavior a "design feature," not a vulnerability.
[]
GHSA-xfrj-fcpr-f4m8
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zach Silberstein RLM Elementor Widgets Pack allows DOM-Based XSS.This issue affects RLM Elementor Widgets Pack: from n/a through 1.3.1.
[]
GHSA-73q6-p6x5-9wrv
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
[]
GHSA-8957-m257-p6hc
IBM Security Privileged Identity Manager Virtual Appliance 2.2.1 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 144408.
[]
CVE-2022-42925
Unrestricted Upload of File with Dangerous Type in Forma LMS
There is a vulnerability on Forma LMS version 3.1.0 and earlier that could allow an authenticated attacker (with the role of student) to privilege escalate in order to upload a Zip file through the plugin upload component. The exploitation of this vulnerability could lead to a remote code injection.
[ "cpe:2.3:a:formalms:formalms:*:*:*:*:*:*:*:*" ]
CVE-2020-13919
emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to achieve command injection via a crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
[ "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*" ]
GHSA-cvx8-qmxw-w79f
Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
[]
GHSA-vcjm-gfv3-vvv7
SQL injection vulnerability in modules/Downloads/admin.php in the Admin section of PostNuke 0.762 allows remote attackers to execute arbitrary SQL commands via the hits parameter.
[]
GHSA-f3pf-h636-3p76
Cross-site scripting (XSS) vulnerability in the file manager in admin/bro_main.php in AlternC 0.9.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a folder name.
[]
GHSA-jfjf-7gvv-h3xf
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, if the firmware sends a service ready event to the host with a large number in the num_hw_modes or num_phy, then it could result in an integer overflow which may potentially lead to a buffer overflow.
[]
CVE-2017-6441
The _zval_get_long_func_ex in Zend/zend_operators.c in PHP 7.1.2 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted use of "declare(ticks=" in a PHP script. NOTE: the vendor disputes the classification of this as a vulnerability, stating "Please do not request CVEs for ordinary bugs. CVEs are relevant for security issues only.
[ "cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*" ]
GHSA-5f97-mqjw-2v8q
A vulnerability was found in SourceCodester Human Resource Management System. It has been classified as critical. Affected is an unknown function of the file getstatecity.php. The manipulation of the argument sc leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-210714 is the identifier assigned to this vulnerability.
[]
GHSA-h8qx-36w6-3rc4
In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
[]
GHSA-43qm-4w5w-7m4c
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
[]
GHSA-ff48-vjqx-6gfj
Vulnerability in the PeopleSoft Enterprise FIN Receivables component of Oracle PeopleSoft Products (subcomponent: Receivables). The supported version that is affected is 9.2. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Receivables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Receivables accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
[]
CVE-2017-17752
Ability Mail Server 3.3.2 has Cross Site Scripting (XSS) via the body of an e-mail message, with JavaScript code executed on the Read Mail screen (aka the /_readmail URI). This is fixed in version 4.2.4.
[ "cpe:2.3:a:codecrafters:ability_mail_server:3.3.2:*:*:*:*:*:*:*" ]
CVE-2010-3503
Unspecified vulnerability in Oracle Solaris 10 and OpenSolaris allows local users to affect confidentiality and integrity via unknown vectors related to su.
[ "cpe:2.3:o:oracle:opensolaris:*:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*" ]
GHSA-5656-pvjm-rmvr
IBM Jazz for Service Management and IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204269.
[]
CVE-2024-47261
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
[]
CVE-2023-46768
Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally.
[ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ]
GHSA-j47w-xw83-59xw
Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
[]
CVE-2018-1002008
There is a reflected XSS vulnerability in WordPress Arigato Autoresponder and News letter v2.5.1.8 This vulnerability requires administrative privileges to exploit. There is an XSS vulnerability in list-user.html.php:4: via GET request offset variable.
[ "cpe:2.3:a:kibokolabs:arigato_autoresponder_and_newsletter:2.5.1.8:*:*:*:*:wordpress:*:*" ]
CVE-2018-5925
A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a static buffer overflow, which could allow remote code execution.
[ "cpe:2.3:o:hp:t8x44_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t8x44:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:3aw51a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3aw51a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9u28b_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9u28b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3a82a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3a82a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:v1n08a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:v1n08a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y5h80a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y5h80a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d4h24b_firmware:1826a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d4h24b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5s57a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5s57a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k4t99b_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k4t99b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k4u04b_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k4u04b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t8x39_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t8x39:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:1sh08_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:1sh08:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:3aw44a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3aw44a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9u19a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9u19a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3a78b_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3a78b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:4uj28b_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:4uj28b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:v1n01a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:v1n01a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y5h60a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y5h60a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d4h22a_firmware:1826a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d4h22a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u57b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v82a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v82b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v82b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v82c_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v82c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v82d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y3z57_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y3z57:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w1b33_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w1b33:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w1b39_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w1b39:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w1b37_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w1b37:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w1b38_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w1b38:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u55a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u55b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u55b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u55c_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u55c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u55d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y3z45_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y3z45:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y3z47_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y3z47:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v80a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v80b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q15a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q15b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q15d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q17a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q17c_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q17c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q17d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y3z46_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y3z46:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y3z44_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y3z44:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q19a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q19d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q20a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q20b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q20c_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q20d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q21a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q21c_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q21d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9z76a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9z76d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w1b31_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w1b31:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y3z54_firmware:005.1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y3z54:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q16a_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q16b_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q16b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q16c_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q16c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3q16d_firmware:001.1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn459a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn459a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn463a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn463a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn460a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn460a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn461a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn461a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cv037a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cv037a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn598a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn598a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:n9m07a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:n9m07a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq891a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq891a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq891b_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq891b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq891c_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq891c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq891ar_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq891ar:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq890a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq890a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq890b_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq890b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq890c_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq890c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq890d_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq890d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq890e_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq890e:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq890ar_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq890ar:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq893a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq893a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq893b_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq893b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq893c_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq893c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq893e_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq893e:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq893ar_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq893ar:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f9a29a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f9a29a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f9a29b_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f9a29b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t5d66a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t5d66a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f9a28a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f9a28a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f9a28b_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f9a28b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:1jl02b_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:1jl02b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:1jl02a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:1jl02a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t5d67a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t5d67a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v86a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v86a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t8w51a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t8w51a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9j41_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9j41:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f0v64_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f0v64:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u63_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u63:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w3u23_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w3u23:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5s65a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5s65a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:l8l91a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:l8l91a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2u86_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2u86:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2u76_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2u76:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:b9s57c_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b9s57c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5s60a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5s60a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0a23a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0a23a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2q28a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2q28a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:p0r21a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p0r21a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:x3b09a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:x3b09a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:2nd31a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:2nd31a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9u23_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9u23:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:v1n02a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:v1n02a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y5z00a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y5z00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5s43_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5s43:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9u05b_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9u05b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:1dt61a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:1dt61a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:3yz74a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3yz74a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:4sc29a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:4sc29a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j9v87a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j9v87a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t8w35a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t8w35a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5r96a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5r96a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7v42c_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7v42c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz283a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz283a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz284a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz284a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:b4l08a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b4l08a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f1h97_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f1h97:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz282a_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz282a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g0v48b_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g0v48b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g0v48c_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g0v48c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz276a_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz276a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq176_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq176:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9t80a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9t80a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9t80b_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9t80b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9t89a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9t89a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d3p93a_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3p93a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9h48_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9h48:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f0v63_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f0v63:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f0v67_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f0v67:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9t01_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9t01:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u59_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u59:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6u69_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6u69:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9h57_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9h57:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:w3u25_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:w3u25:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2u85_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2u85:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2u91_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2u91:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4a54_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z4a54:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a9j40a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a9j40a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d4j85b_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d4j85b:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g0v47_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g0v47:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g0450_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g0450:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7c84_firmware:1831a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7c84:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7g86_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7g86:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:b9s56a_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b9s56a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:b9s58a_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b9s58a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f8b05a_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f8b05a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f8b13a_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f8b13a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f8b04a_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f8b04a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f8b06a_firmware:1830b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f8b06a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f8b12a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f8b12a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:e4w43_firmware:1829d:*:*:*:*:*:*:*", "cpe:2.3:h:hp:e4w43:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7g18a_firmware:1829d:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7g18a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7g93a_firmware:1737j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7g93a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z6z11a_firmware:1805j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z6z11a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4b53a_firmware:1737j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z4b53a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z6z95a_firmware:1805j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z6z95a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z6z97a_firmware:1805j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z6z97a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz993a_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz993a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:l9b95a_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:l9b95a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:n4l14c_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:n4l14c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:n4k99c_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:n4k99c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz992a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz992a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:l9d57a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:l9d57a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:n4l17a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:n4l17a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:n4l18c_firmware:1826a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:n4l18c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d4h21a_firmware:1826a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d4h21a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d4h25a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d4h25a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5r95_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5r95:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f5s00_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f5s00:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7v35_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7v35:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cr771a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cr771a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz152a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz152a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz294a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz294a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:b4l03_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b4l03:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d4j74_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d4j74:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f1h96_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f1h96:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f1j00_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f1j00:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f9d36_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f9d36:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k9v76_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k9v76:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:v6d27_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:v6d27:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2u75_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2u75:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m2u81_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m2u81:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4b12_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z4b12:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:b9s76_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b9s76:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f8b09_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f8b09:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t1p36_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t1p36:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:e3e03a_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:e3e03a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:c9s13a_firmware:1827d:*:*:*:*:*:*:*", "cpe:2.3:h:hp:c9s13a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn581a_firmware:1827d:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn581a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn583a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn583a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:f0m65a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:f0m65a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g1w52a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g1w52a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:p4c78a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4c78a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t3p03a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t3p03a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t3p04a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t3p04a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j7k33a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j7k33a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0f28a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0f28a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0g25a_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0g25a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cr768a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cr768a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g3j47a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g3j47a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cr769a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cr769a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g1x85a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g1x85a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cv136a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cv136a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cr7770a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cr7770a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz292a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz292a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz293a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz293a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:e3e02a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:e3e02a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j2d37a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j2d37a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j7k34a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j7k34a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0f29a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0f29a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y0s18a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y0s18a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:y0s19a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:y0s19a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:g5j38a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:g5j38a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t1p99_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t1p99:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t1q00_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t1q00:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d9l63a_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d9l64a_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0g70a_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j3p68a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cm749a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cm749a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cm750a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cm750a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn577a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn577a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a7f64a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a7f64a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d7z36a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d7z36a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:e1d34a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:e1d34a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j5t77a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j5t77a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0k98a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0k98a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a7f65a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a7f65a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d7z37a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d7z37a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:a7f66a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a7f66a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:e2d42a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:e2d42a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:e1d36a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:e1d36a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d9l18a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d9l18a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6x76a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6x76a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j6x80a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j6x80a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7s37a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7s37a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m9l65a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m9l65a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m9l70a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m9l70a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m9l81a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m9l81a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0g45a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0g45a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d9l19a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d9l19a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j7a28a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j7a28a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:j7a31a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j7a31a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7s34a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7s34a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m9l73a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m9l73a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:m9l80a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:m9l80a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0g50a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0g50a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0g54a_firmware:1828a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0g54a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t6t77a_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t6t77a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:d9l20a_firmware:1827a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d9l20a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:t0g56a_firmware:1827b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:t0g56a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:k7s42a_firmware:1832a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:k7s42a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq176a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq176a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq183a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq183a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cx042_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cx042:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cq761a_firmware:1829b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cq761a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cx017a_firmware:1828b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cx017a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz025a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz025a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cz045a_firmware:1830a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz045a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:cn216a_firmware:1829a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cn216a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4b07a_firmware:1737j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z4b07a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4b56a_firmware:1805j:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z4b56a:-:*:*:*:*:*:*:*" ]
GHSA-wpmw-7q3p-9ww7
The Ninja Forms Contact Form WordPress plugin before 3.6.22 does not properly escape user input before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
[]
GHSA-gh8c-xxj8-7q69
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in SoftLab Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files Into Your WordPress Site.This issue affects Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files Into Your WordPress Site: from n/a through 1.3.2.
[]
GHSA-7h94-w3cq-9hqq
SQL injection vulnerability in news.php in DZ EROTIK Auktionshaus V4rgo allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
GHSA-7233-cpff-xw5j
A vulnerability in the OSPF Version 2 (OSPFv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation when the affected software processes certain OSPFv2 packets with Link-Local Signaling (LLS) data. An attacker could exploit this vulnerability by sending a malformed OSPFv2 packet to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.
[]
GHSA-534r-qr63-67jp
Runtime library in GNU Ada compiler (GNAT) 3.12p through 3.14p allows local users to modify files of other users via a symlink attack on temporary files.
[]
GHSA-27mm-mp84-cq8h
A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter.
[]
GHSA-pj93-8v65-p9w3
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
[]
GHSA-69m4-r76x-j23h
Deserialization of Untrusted Data vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
[]
CVE-2015-7109
IOAcceleratorFamily in Apple OS X before 10.11.2 and tvOS before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-9x2r-5f7q-7jgp
Cross-site scripting (XSS) vulnerability in index.cgi for Bandmin 1.4 allows remote attackers to insert arbitrary HTML or script via (1) the year parameter in a showmonth action, (2) the month parameter in a showmonth action, or (3) the host parameter in a showhost action.
[]
GHSA-fv2j-x4xv-c6qc
Frog CMS 0.9.5 has XSS in /install/index.php via the ['config']['admin_username'] field.
[]
CVE-2020-26559
Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisioner’s public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue.
[ "cpe:2.3:a:bluetooth:mesh_profile:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bluetooth:mesh_profile:1.0.1:*:*:*:*:*:*:*" ]
CVE-2021-30590
Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
GHSA-977f-qgcg-6xmx
The EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2021-20374
IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195522.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.1:*:*:*:*:*:*:*" ]
GHSA-pmxf-9g87-4gxx
IBM Connections 4.0, 4.5, 5.0, and 5.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998294.
[]
CVE-2017-15768
IrfanView version 4.50 - 64bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .tif file, related to "Data from Faulting Address controls Branch Selection starting at image000007f7_42060000+0x0000000000094113."
[ "cpe:2.3:a:irfanview:irfanview:4.50:*:*:*:*:x64:*:*" ]
GHSA-3fvg-4v2m-98jf
JWS and JWT signature validation vulnerability with special characters
ImpactJsrsasign supports JWS(JSON Web Signatures) and JWT(JSON Web Token) validation. However JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake.For example, even if a string of non Base64URL encoding characters such as `!@$%` or `\11` is inserted into a valid JWS or JWT signature value string, it will still be a valid JWS or JWT signature by mistake.When jsrsasign's JWS or JWT validation is used in OpenID connect or OAuth2, this vulnerability will affect to authentication or authorization.By our internal assessment, CVSS 3.1 score will be 8.6. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:NPatchesUsers validate JWS or JWT signatures should upgrade to 10.5.25.WorkaroundsValidate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.ACKNOWLEDGEMENTThanks to Adi Malyanker and Or David for this vulnerability report. Also thanks for [Snyk security team](https://snyk.io/) for this coordination.Referenceshttps://github.com/kjur/jsrsasign/releases/tag/10.5.25 https://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf kjur's advisories https://github.com/advisories/GHSA-3fvg-4v2m-98jf github advisories https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898 https://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verifyJWT https://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verify https://kjur.github.io/jsrsasign/api/symbols/global__.html#.isBase64URLDot https://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWS-verification https://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWT-verification https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122
[]
GHSA-x53h-2cjp-mwcx
Improper DLL loading algorithms in B&R Automation Studio may allow an authenticated local attacker to execute code with elevated privileges.This issue affects Automation Studio versions before 4.12.
[]
GHSA-533g-xcpj-m6xr
Cross-site request forgery (CSRF) vulnerability in administration/administrators.php in Link Up Gold 5.0 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.
[]
CVE-2024-10187
myCred <= 2.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via mycred_link Shortcode
The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_link shortcode in all versions up to, and including, 2.7.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:mycred:mycred:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-49925
fbdev: efifb: Register sysfs groups through driver core
In the Linux kernel, the following vulnerability has been resolved: fbdev: efifb: Register sysfs groups through driver core The driver core can register and cleanup sysfs groups already. Make use of that functionality to simplify the error handling and cleanup. Also avoid a UAF race during unregistering where the sysctl attributes were usable after the info struct was freed.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2025-23189
Missing Authorization Check in SAP NetWeaver and ABAP Platform (SDCCN)
Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an authenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability
[]
CVE-2020-1825
FusionAccess with versions earlier than 6.5.1.SPC002 have a Denial of Service (DoS) vulnerability. Due to insufficient verification on specific input, attackers can exploit this vulnerability by sending constructed messages to the affected device through another device on the same network. Successful exploit could cause affected devices to be abnormal.
[ "cpe:2.3:a:huawei:fusionaccess:*:*:*:*:*:*:*:*" ]
GHSA-9xc9-7qcm-99r9
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.
[]
GHSA-54xq-rwg3-336q
Huawei P8 before GRA-CL00C92B210, before GRA-L09C432B200, before GRA-TL00C01B210, and before GRA-UL00C00B210 allows remote attackers to obtain user equipment (aka UE) measurements of signal strengths.
[]
GHSA-v539-jjjq-mv6h
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mammothology WP Full Stripe Free plugin <= 1.6.1 versions.
[]
CVE-2022-43900
IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps security bypass
IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 could provide a weaker than expected security. A local attacker can create an outbound network connection to another system. IBM X-Force ID: 240827.
[ "cpe:2.3:a:ibm:websphere_automation_for_ibm_cloud_pak_for_watson_aiops:*:*:*:*:*:*:*:*" ]
GHSA-qg9h-x99x-fcvh
In the Linux kernel, the following vulnerability has been resolved:tunnels: fix out of bounds access when building IPv6 PMTU errorIf the ICMPv6 error is built from a non-linear skb we get the following splat,BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240 Read of size 4 at addr ffff88811d402c80 by task netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220/0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32a0 br_dev_queue_push_xmit+0x39d/0x6a0Use skb_checksum instead of csum_partial who cannot deal with non-linear SKBs.
[]
CVE-2017-12482
The ledger::parse_date_mask_routine function in times.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
[ "cpe:2.3:a:ledger-cli:ledger:3.1.1:*:*:*:*:*:*:*" ]
GHSA-fvcc-w2r6-4886
WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.
[]
CVE-2008-1992
Acidcat CMS 3.4.1 does not properly restrict access to (1) default_mail_aspemail.asp, (2) default_mail_cdosys.asp or (3) default_mail_jmail.asp, which allows remote attackers to bypass restrictions and relay email messages with modified From, FromName, and To fields.
[ "cpe:2.3:a:acidcat:acidcat_cms:3.4.1:*:*:*:*:*:*:*" ]
CVE-2002-0718
Web authoring command in Microsoft Content Management Server (MCMS) 2001 allows attackers to authenticate and upload executable content, by modifying the upload location, aka "Program Execution via MCMS Authoring Function."
[ "cpe:2.3:a:microsoft:content_management_server:2001:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:content_management_server:2001:sp1:*:*:*:*:*:*" ]
CVE-2014-5621
The Office Zombie (aka com.fluik.OfficeZombieGoogleFree) application 1.3.13 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:fluik:office_zombie:1.3.13:*:*:*:*:android:*:*" ]
CVE-2022-45550
AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE).
[ "cpe:2.3:a:ayacms_project:ayacms:3.1.2:*:*:*:*:*:*:*" ]
CVE-2020-27857
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of NEF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11488.
[ "cpe:2.3:a:foxitsoftware:foxit_studio_photo:3.6.6.922:*:*:*:*:*:*:*" ]
GHSA-44q3-f5j3-5jw6
product_review.php in Koan Software Mega Mall allows remote attackers to obtain the installation path via a request with an empty value of the x[] parameter.
[]
GHSA-h3x4-h8pm-4g73
IBM Rational DOORS Web Access 9.5.1 through 9.5.2.9, and 9.6 through 9.6.1.9 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 153916.
[]
GHSA-vrmh-4mwf-2jxm
Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
[]
CVE-2002-1757
PHProjekt 2.0 through 3.1 relies on the $PHP_SELF variable for authentication, which allows remote attackers to bypass authentication for scripts via a request to a .php file with "sms" in the URL, which is included in the PATH_INFO portion of the $PHP_SELF variable, as demonstrated using "mail_send.php/sms".
[ "cpe:2.3:a:phprojekt:phprojekt:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.1a:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.4a:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:3.1a:*:*:*:*:*:*:*" ]
CVE-2011-0316
The Administrative Console component in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.35 and 7.0 before 7.0.0.15 does not properly restrict access to console servlets, which allows remote attackers to obtain potentially sensitive status information via a direct request.
[ "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*" ]
GHSA-3753-r5q9-x6fx
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device. &nbsp; This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
[]
GHSA-xh68-gx4p-f4cx
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash.
[]
CVE-2022-30831
Wedding Management System v1.0 is vulnerable to SQL Injection via Wedding-Management/wedding_details.php.
[ "cpe:2.3:a:wedding_management_system_project:wedding_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2017-20015
WEKA INTEREST Security Scanner LAN Viewer denial of service
A vulnerability, which was classified as problematic, was found in WEKA INTEREST Security Scanner up to 1.8. This affects an unknown part of the component LAN Viewer. The manipulation with an unknown input leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:a:weka:interest_security_scanner:*:*:*:*:*:*:*:*" ]
GHSA-xq6j-x8pq-g3gr
appium-desktop OS Command Injection vulnerability
appium-desktop v1.14.1 and prior is vulnerable to OS Command Injection.
[]
GHSA-p97q-577c-vxp7
The Image Over Image For WPBakery Page Builder WordPress plugin before 3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
GHSA-fqq3-69m6-g84r
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.
[]
GHSA-q84g-j4pw-hjh5
Cross site scripting (XSS) vulnerability in Zoho ManageEngine ServiceDesk Plus 14 via embedding videos in the language component.
[]
CVE-2008-1976
Multiple cross-site scripting (XSS) vulnerabilities in the Drupal modules (1) Internationalization (i18n) 5.x before 5.x-2.3 and 5.x-1.1 and 6.x before 6.x-1.0 beta 1; and (2) Localizer 5.x before 5.x-3.4, 5.x-2.1, and 5.x-1.11; allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:localizer_project:localizer:5.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.4:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.5:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.6:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.7:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.8:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.9:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.10:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-1.x:dev:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-2.x:dev:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-3.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-3.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-3.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:localizer_project:localizer:5.x-3.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:internationalization_project:internationalization:5.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:internationalization_project:internationalization:5.x-1.x:dev:*:*:*:drupal:*:*", "cpe:2.3:a:internationalization_project:internationalization:5.x-2.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:internationalization_project:internationalization:5.x-2.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:internationalization_project:internationalization:5.x-2.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:internationalization_project:internationalization:6.x-1.x:dev:*:*:*:drupal:*:*" ]
GHSA-gwwq-j5vg-7jc3
The Konnichiwa! Membership WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the plan_id parameter in the ~/views/subscriptions.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.8.3.
[]
GHSA-p579-25jc-wxr5
In the Linux kernel, the following vulnerability has been resolved:mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath()As commit 18365225f044 ("hwpoison, memcg: forcibly uncharge LRU pages"), hwpoison will forcibly uncharg a LRU hwpoisoned page, the folio_memcg could be NULl, then, mem_cgroup_track_foreign_dirty_slowpath() could occurs a NULL pointer dereference, let's do not record the foreign writebacks for folio memcg is null in mem_cgroup_track_foreign_dirty() to fix it.
[]
GHSA-5mm9-55c9-p5r7
Malicious Package in mogoose
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.RecommendationRemove the package from your environment. There are no indications of further compromise.
[]
CVE-2022-25598
Apache DolphinScheduler user registration is vulnerable to ReDoS attacks
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks, Apache DolphinScheduler users should upgrade to version 2.0.5 or higher.
[ "cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*" ]
CVE-2002-2140
Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS.
[ "cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*" ]
CVE-2010-1495
Directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
[ "cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2024-43284
WordPress WP Travel Gutenberg Blocks plugin <= 3.5.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel WP Travel Gutenberg Blocks allows Stored XSS.This issue affects WP Travel Gutenberg Blocks: from n/a through 3.5.1.
[]
CVE-2018-11228
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP).
[ "cpe:2.3:o:crestron:crestron_toolbox_protocol_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:dmc-str:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-1060:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-1060-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-560:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-560-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-760:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-760-nc:-:*:*:*:*:*:*:*" ]
CVE-2004-1901
Portage before 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on the lockfiles.
[ "cpe:2.3:a:gentoo:portage:*:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:portage:2.0.50:-:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:-:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*" ]
GHSA-gqc3-253j-25g7
An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'.
[]
GHSA-q787-qgw2-j2qf
Stored Cross-site Scripting vulnerability in Jenkins Tests Selector Plugin
Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[]
GHSA-25vv-55gh-jghh
Buffer overflow in BitchX IRC client allows remote attackers to cause a denial of service and possibly execute arbitrary commands via an IP address that resolves to a long DNS hostname or domain name.
[]
GHSA-2cxw-4p8f-4qp7
DOS / potential heap overwrite in mkv demuxing using zlib decompression. Integer overflow in matroskademux element in gst_matroska_decompress_data function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.
[]
CVE-1999-0016
Land IP denial of service.
[ "cpe:2.3:o:cisco:ios:7000:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:winsock:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*" ]
CVE-2021-42104
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107.
[ "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*", "cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2020-0891
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Reflective XSS Vulnerability'. This CVE ID is unique from CVE-2020-0795.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
GHSA-gcpg-c569-xfr4
Advanced Custom Fields versions prior to 5.11 and Advanced Custom Fields Pro versions prior to 5.11 contain a missing authorization vulnerability in obtaining the user list which may allow a user to obtain the unauthorized information via unspecified vectors.
[]