Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-1999-0922
An example application in ColdFusion Server 4.0 allows remote attackers to view source code via the sourcewindow.cfm file.
[ "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*" ]
GHSA-xpgw-whr6-42cx
Multiple buffer overflows in NASA Common Data Format (CDF) allow context-dependent attackers to execute arbitrary code, as demonstrated using (1) an array index error in the ReadAEDRList64 function, and other errors in the (2) SearchForRecord_r_64, (3) LastRecord64, (4) CDFsel64, and other unspecified functions.
[]
CVE-2023-5140
Bonus for Woo < 5.8.3 - Reflected Cross-Site Scripting
The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[ "cpe:2.3:a:computy:bonus_for_woo:*:*:*:*:*:wordpress:*:*" ]
GHSA-h56m-vwxc-3qpw
Directory traversal vulnerability in actionpack
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
[]
CVE-2023-24922
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*" ]
CVE-2023-25821
Nextcloud download permissions can be changed by resharer
Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:nextcloud:nextcloud_server:25.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:nextcloud:nextcloud_server:25.0.0:*:*:*:enterprise:*:*:*" ]
GHSA-j5vv-6wjg-cfr8
changedetection.io Vulnerable to Improper Input Validation Leading to LFR/Path Traversal
SummaryImproper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using `file:../../../etc/passwd` or `file: ///etc/passwd` can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient.DetailsThe check in this line of code is insufficient.The attacker can still bypass this by using: -`file:../../../../etc/passwd` -`file: ///etc/passwd` (with space before /)PoCOpen up a changedetection.io instance with a webdriver configured.Create a new watch with `file:../../../../etc/passwd`.Check the watch preview.The contents of `/etc/passwd` should pop out.Screenshots![image](https://github.com/user-attachments/assets/55c34f2e-cafb-4a7a-a7ef-ec222e3f519b) ![image](https://github.com/user-attachments/assets/d41189f5-7bf2-48b5-9ce3-c26f79cefeda)
[]
GHSA-24jr-8pxp-69pm
klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322.
[]
GHSA-x7gc-h9pg-938q
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
[]
CVE-2017-1000110
Blue Ocean allows the creation of GitHub organization folders that are set up to scan a GitHub organization for repositories and branches containing a Jenkinsfile, and create corresponding pipelines in Jenkins. It did not properly check the current user's authentication and authorization when configuring existing GitHub organization folders. This allowed users with read access to the GitHub organization folder to reconfigure it, including changing the GitHub API endpoint for the organization folder to an attacker-controlled server to obtain the GitHub access token, if the organization folder was initially created using Blue Ocean.
[ "cpe:2.3:a:jenkins:blue_ocean:*:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:blue_ocean:1.2.0:beta-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:blue_ocean:1.2.0:beta-2:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:blue_ocean:1.2.0:beta-3:*:*:*:jenkins:*:*" ]
CVE-2006-6613
Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
[ "cpe:2.3:a:phpalbum.net:phpalbum:*:*:*:*:*:*:*:*" ]
GHSA-rhv8-wfm8-gjqj
In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules.
[]
CVE-2016-6646
The vApp Managers web application in EMC Unisphere for VMAX Virtual Appliance 8.x before 8.3.0 and Solutions Enabler Virtual Appliance 8.x before 8.3.0 allows remote attackers to execute arbitrary code via crafted input to the (1) GetSymmCmdRequest or (2) RemoteServiceHandler class.
[ "cpe:2.3:a:dell:emc_unisphere:8.0:*:*:*:*:vmax:*:*", "cpe:2.3:a:dell:emc_unisphere:8.1:*:*:*:*:vmax:*:*", "cpe:2.3:a:dell:emc_unisphere:8.1.2:*:*:*:*:vmax:*:*", "cpe:2.3:a:dell:emc_unisphere:8.2:*:*:*:*:vmax:*:*", "cpe:2.3:a:emc:solutions_enabler:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:solutions_enabler:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:solutions_enabler:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:solutions_enabler:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:solutions_enabler:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:unisphere:8.0.3:*:*:*:*:vmax:*:*" ]
CVE-2016-1702
The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.
[ "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2021-22805
A CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause deletion of arbitrary files in the context of the user running IGSS due to lack of validation of network messages. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior)
[ "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system_data_collector:*:*:*:*:*:*:*:*" ]
CVE-2021-33691
NWDI Notification Service versions - 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.SAP NetWeaver Development Infrastructure Notification Service allows a threat actor to send crafted scripts to a victim. If the victim has an active session when the crafted script gets executed, the threat actor could compromise information in victims session, and gain access to some sensitive information also.
[ "cpe:2.3:a:sap:netweaver_development_infrastructure:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_development_infrastructure:7.40:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_development_infrastructure:7.50:*:*:*:*:*:*:*" ]
CVE-2023-25619
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when communicating over the Modbus TCP protocol.
[ "cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:modicon_momentum_unity_m1e_processor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_momentum_unity_m1e_processor:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:modicon_mc80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_mc80:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:tsxp57_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tsxp57:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:bmep58s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:bmep58s:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:bmeh58s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:bmeh58s:-:*:*:*:*:*:*:*" ]
CVE-2019-4077
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157111.
[ "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.1:*:*:*:standard:*:*:*" ]
GHSA-298c-rvvp-xh7q
In the Linux kernel, the following vulnerability has been resolved:ASoC: topology: Fix references to freed memoryMost users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
[]
GHSA-v6rq-fh3x-6xwm
Out-of-bounds Read in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
[]
GHSA-6ppc-xr55-mcvf
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
[]
GHSA-332g-rf22-2vcg
A path traversal vulnerability exists in the latest version of stangirard/quivr. This vulnerability allows an attacker to upload files to arbitrary paths in an S3 bucket by manipulating the file path in the upload request.
[]
GHSA-pqw3-898v-hg67
In the Linux kernel, the following vulnerability has been resolved:net/9p/usbg: fix handling of the failed kzalloc() memory allocationOn the linux-next, next-20241108 vanilla kernel, the coccinelle tool gave the following error report:./net/9p/trans_usbg.c:912:5-11: ERROR: allocation function on line 911 returns NULL not ERR_PTR on failurekzalloc() failure is fixed to handle the NULL return case on the memory exhaustion.
[]
GHSA-qpvq-h769-rrw8
Integer overflow in ColorSync in Apple Safari before 4.0.5 on Windows, and iTunes before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image with a crafted color profile that triggers a heap-based buffer overflow.
[]
GHSA-x6xh-3jj8-cvg4
The JetAdmin web interface for HP JetDirect does not set a password for the telnet interface when the admin password is changed, which allows remote attackers to gain access to the printer.
[]
CVE-2019-9729
In Shanda MapleStory Online V160, the SdoKeyCrypt.sys driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating the IOCtl 0x8000c01c input value, leading to an integer signedness error and a heap-based buffer underflow.
[ "cpe:2.3:a:shanda:maplestory_online:160.0:*:*:*:*:*:*:*" ]
CVE-2018-4268
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS High Sierra 10.13.6.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
CVE-2023-49239
Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ]
CVE-2014-3652
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.
[ "cpe:2.3:a:redhat:keycloak:1.0.1:*:*:*:*:*:*:*" ]
CVE-2025-31614
WordPress Terms Before Download plugin <= 1.0.4 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hiroprot Terms Before Download allows Stored XSS. This issue affects Terms Before Download: from n/a through 1.0.4.
[]
CVE-2020-12048
Phoenix Hemodialysis Delivery System SW 3.36 and 3.40, The Phoenix Hemodialysis device does not support data-in-transit encryption (e.g., TLS/SSL) when transmitting treatment and prescription data on the network between the Phoenix system and the Exalis dialysis data management tool. An attacker with access to the network could observe sensitive treatment and prescription data sent between the Phoenix system and the Exalis tool.
[ "cpe:2.3:o:baxter:phoenix_x36_firmware:3.36:*:*:*:*:*:*:*", "cpe:2.3:o:baxter:phoenix_x36_firmware:3.40:*:*:*:*:*:*:*", "cpe:2.3:h:baxter:phoenix_x36:-:*:*:*:*:*:*:*" ]
CVE-2023-44143
WordPress Bamboo Columns Plugin <= 1.6.1 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bamboo Mcr Bamboo Columns allows Stored XSS.This issue affects Bamboo Columns: from n/a through 1.6.1.
[ "cpe:2.3:a:bamboo_mcr:bamboo_columns:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-25940
bhyveload(8) host file access
`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
[]
CVE-2018-5977
SQL Injection exists in Affiligator Affiliate Webshop Management System 2.1.0 via a search/?q=&price_type=range&price= request.
[ "cpe:2.3:a:getaffiligator:affiligator:2.1.0:*:*:*:*:*:*:*" ]
CVE-2019-18801
An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's access control mechanisms such as path based routing. An attacker can also modify requests from other users that happen to be proximal temporally and spatially.
[ "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*" ]
CVE-2008-3300
AlphAdmin CMS 1.0.5/03 allows remote attackers to bypass authentication and gain administrative access by setting the aa_login cookie value to 1. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:alphadmin:alphadmin_cms:1.0.5:sp2:*:*:*:*:*:*" ]
CVE-2017-14733
ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles RLE headers that specify too few colors, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
[ "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2023-42907
Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Sonoma 14.2. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2023-41977
The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2. Visiting a malicious website may reveal browsing history.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2018-21149
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.50, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.0.54, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64.
[ "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*" ]
CVE-2007-3327
httpsv.exe in HTTP Server 1.6.2 allows remote attackers to obtain sensitive information (script source code) via a URI with a trailing %20 (encoded space).
[ "cpe:2.3:a:bughunter:http_server:1.6.2:*:*:*:*:*:*:*" ]
GHSA-vm9c-39jx-q45w
Moodle vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
lib/filelib.php in Moodle through 2.2.11, 2.3.x before 2.3.10, 2.4.x before 2.4.7, and 2.5.x before 2.5.3 does not send "Cache-Control: private" HTTP headers, which allows remote attackers to obtain sensitive information by requesting a file that had been previously retrieved by a caching proxy server.
[]
GHSA-f454-gp59-g2j5
The Web Services Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 and 7.0 before 7.0.0.3 has an unspecified "security problem" in the XML digital-signature specification, which has unknown impact and attack vectors.
[]
GHSA-5652-4j93-xhg6
In the Linux kernel, the following vulnerability has been resolved:clk: clk-apple-nco: Add NULL check in applnco_probeAdd NULL check in applnco_probe, to handle kernel NULL pointer dereference error.
[]
CVE-2013-5692
Directory traversal vulnerability in X2Engine X2CRM before 3.5 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the file parameter to index.php/admin/translationManager.
[ "cpe:2.3:a:x2engine:x2crm:*:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:2.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:x2engine:x2crm:3.4:*:*:*:*:*:*:*" ]
CVE-2021-41219
Undefined behavior via `nullptr` reference binding in sparse matrix multiplication
TensorFlow is an open source platform for machine learning. In affected versions the code for sparse matrix multiplication is vulnerable to undefined behavior via binding a reference to `nullptr`. This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:*:*:*:*:*:*:*" ]
GHSA-gvjh-5h39-4px4
The Shopwarden – Automated WooCommerce monitoring & testing plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.11. This is due to missing or incorrect nonce validation on the save_setting() function. This makes it possible for unauthenticated attackers to update arbitrary options and achieve privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-2hx7-84c2-vv8q
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.
[]
CVE-2020-5757
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.
[ "cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*", "cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*", "cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*" ]
GHSA-9q7v-rrcv-j2hh
The WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0.
[]
CVE-2025-26671
Windows Remote Desktop Services Remote Code Execution Vulnerability
Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
[]
GHSA-9wvm-c92g-hvqg
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer.
[]
CVE-2019-2268
Possible OOB read issue in P2P action frames while handling WLAN management frame in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8996AU, MSM8998, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS405, QCS605, SDA660, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*" ]
CVE-2024-37341
Microsoft SQL Server Elevation of Privilege Vulnerability
Microsoft SQL Server Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:sql_2016_azure_connect_feature_pack:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*" ]
GHSA-4783-m498-cppr
Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.
[]
CVE-2009-3660
PHP remote file inclusion vulnerability in libraries/database.php in Efront 3.5.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation.
[ "cpe:2.3:a:efrontlearning:efront:*:*:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:efrontlearning:efront:3.5.1:*:*:*:*:*:*:*" ]
CVE-2020-2020
Cortex XDR Agent: Exceptional condition denial-of-service (DoS)
An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.
[ "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*" ]
CVE-2017-0457
An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31695439. References: QC-CR#1086123, QC-CR#1100695.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
GHSA-x7j3-rmwr-2rrx
The Buzz Club – Night Club, DJ and Music Festival Event WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' function in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.
[]
CVE-2004-1464
Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.
[ "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*" ]
GHSA-2hq5-5vh4-f96j
Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.
[]
CVE-2024-31177
Out-of-bounds Read in libfluid_msg library
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg modules). This vulnerability is associated with program routines fluid_msg::of13::TableFeaturePropActions::unpack. This issue affects libfluid: 0.1.0.
[ "cpe:2.3:a:open_networking_foundation:libfluid:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennetworking:libfluid_msg:0.1.0:*:*:*:*:*:*:*" ]
CVE-2014-5762
The Cut the Rope: Time Travel (aka com.zeptolab.timetravel.free.google) application 1.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:zeptolab:cut_the_rope\\:_time_travel:1.3.4:*:*:*:*:android:*:*" ]
CVE-2016-6662
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
GHSA-8qf2-p2j7-qp5x
In the Linux kernel, the following vulnerability has been resolved:ice: Fix improper extts handlingExtts events are disabled and enabled by the application ts2phc. However, in case where the driver is removed when the application is running, a specific extts event remains enabled and can cause a kernel crash. As a side effect, when the driver is reloaded and application is started again, remaining extts event for the channel from a previous run will keep firing and the message "extts on unexpected channel" might be printed to the user.To avoid that, extts events shall be disabled when PTP is released.
[]
CVE-2019-15694
TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
[ "cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
GHSA-876p-j7c4-v654
Cisco TelePresence Video Communication Server (VCS) X8.6 uses the same encryption key across different customers' installations, which makes it easier for local users to defeat cryptographic protection mechanisms by leveraging knowledge of a key from another installation, aka Bug ID CSCuw64516.
[]
CVE-2019-15059
In Liberty lisPBX 2.0-4, configuration backup files can be retrieved remotely from /backup/lispbx-CONF-YYYY-MM-DD.tar or /backup/lispbx-CDR-YYYY-MM-DD.tar without authentication or authorization. These configuration files have all PBX information including extension numbers, contacts, and passwords.
[ "cpe:2.3:a:lispbx_project:lispbx:2.0-4:*:*:*:*:*:*:*", "cpe:2.3:a:lispbx_project:lispbx:2.0-5:*:*:*:*:*:*:*" ]
GHSA-gmw9-2jwr-g5m7
A security feature bypass vulnerability exists in Microsoft Outlook when Office fails to enforce security settings configured on a system, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.
[]
CVE-2016-5874
Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers to cause a denial of service (OPC UA service outage) via crafted TCP packets.
[ "cpe:2.3:a:siemens:simatic_net_pc-software:*:sp1:*:*:*:*:*:*" ]
CVE-2007-4403
The mIRC Control Plug-in for Winamp allows user-assisted remote attackers to execute arbitrary code via the '|' (pipe) shell metacharacter in the name of the song in a .mp3 file.
[ "cpe:2.3:a:mirc:plug-in_for_winamp:*:*:*:*:*:*:*:*" ]
CVE-2023-32207
A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
CVE-2022-49095
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
In the Linux kernel, the following vulnerability has been resolved: scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() The error handling path of the probe releases a resource that is not freed in the remove function. In some cases, a ioremap() must be undone. Add the missing iounmap() call in the remove function.
[]
GHSA-5q2r-92f9-4m49
Improper verification of signature threshold in tough
ImpactThe tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of unique keys before the metadata is considered valid.AWS would like to thank Erick Tryzelaar of the Google Fuchsia Team for reporting this issue.PatchesA fix is available in version 0.7.1.WorkaroundsNo workarounds to this issue are known.ReferencesCVE-2020-6174 is assigned to the same issue in the TUF reference implementation.https://github.com/theupdateframework/tuf/pull/974 https://nvd.nist.gov/vuln/detail/CVE-2020-6174For more informationIf you have any questions or comments about this advisory, [contact AWS Security](https://aws.amazon.com/security/vulnerability-reporting/) at [[email protected]](mailto:[email protected]).
[]
GHSA-cv85-hcw5-w2q9
The FancyBox for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions 3.0.2 to 3.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
CVE-2002-1779
The "block fragmented IP Packets" option in Symantec Norton Personal Firewall 2002 (NPW) does not properly protect against certain attacks on Windows vulnerabilities such as jolt2 (CVE-2000-0305).
[ "cpe:2.3:a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:*" ]
CVE-2008-4457
SQL injection vulnerability in inc/inc_statistics.php in MemHT Portal 3.9.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via a stats_res cookie to index.php.
[ "cpe:2.3:a:memht:memht_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:1.0:final:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:1.5:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:1.5:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:2.0:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:2.0:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:2.5:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:2.5:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:2.9:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:2.9:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.0:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.0:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.1:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.1:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.2:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.3:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.3:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.4:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.4:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.4.5:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.4.5:update:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.5.0:full:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:memht:memht_portal:3.8.5:*:*:*:*:*:*:*" ]
GHSA-wpp2-f4wp-vr8h
An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.
[]
CVE-2016-7085
Untrusted search path vulnerability in the installer in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-g6xf-3xf8-xjg5
Cross-site request forgery (CSRF) vulnerability in the Change Group Permissions module in CMS Made Simple 1.7.1 and earlier allows remote attackers to hijack the authentication of arbitrary users for requests that make permission modifications.
[]
CVE-2016-3363
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3381.
[ "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*" ]
CVE-2008-2162
Cross-site scripting (XSS) vulnerability in SonicWall Email Security 6.1.1 allows remote attackers to inject arbitrary web script or HTML via the Host header in a request to a non-existent web page, which is not properly sanitized in an error page.
[ "cpe:2.3:a:sonicwall:e-mail_security:6.1.1:*:*:*:*:*:*:*" ]
GHSA-3484-2rvh-885x
NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-19724.
[]
CVE-2005-2482
The StateToOptions function in msfweb in Metasploit Framework 2.4 and earlier, when running with the -D option (defanged mode), allows attackers to modify temporary environment variables before the "_Defanged" environment option is checked when processing the Exploit command.
[ "cpe:2.3:a:metasploit:metasploit_framework:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:metasploit:metasploit_framework:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:metasploit:metasploit_framework:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:metasploit:metasploit_framework:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:metasploit:metasploit_framework:2.4:*:*:*:*:*:*:*" ]
GHSA-6xrh-8gj2-m92q
Cross-site scripting (XSS) vulnerability in phpgwapi/inc/common_functions_inc.php in eGroupware before 1.8.004.20120405 allows remote attackers to inject arbitrary web script or HTML via the menuaction parameter to etemplate/process_exec.php. NOTE: some of these details are obtained from third party information.
[]
GHSA-94mw-4r68-8h9f
User could gain access to secure memory due to incorrect argument into address range validation api used in SDI to capture requested contents in Snapdragon Industrial IOT, Snapdragon Mobile
[]
GHSA-hp3p-fc9m-xq9w
Directory traversal vulnerability in the SSL server in AEP Smartgate 4.3b allows remote attackers to download arbitrary files via ..\ (dot dot backslash) sequences in an HTTP GET request.
[]
CVE-2018-2439
The SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, has insufficient request validation (for example, where the request is validated for authenticity and validity) and under certain conditions, will process invalid requests. Several areas of the SAP Internet Graphics Server (IGS) did not require sufficient input validation. Namely, the SAP Internet Graphics Server (IGS) HTTP and RFC listener, SAP Internet Graphics Server (IGS) portwatcher when registering a portwatcher to the multiplexer and the SAP Internet Graphics Server (IGS) multiplexer had insufficient input validation and thus allowing a malformed data packet to cause a crash.
[ "cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:*" ]
GHSA-722f-qh34-fgj6
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32705429.
[]
GHSA-p53v-8c78-56qf
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
CVE-2021-20317
A flaw was found in the Linux kernel. A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
GHSA-p24f-9hfj-fg7m
An elevation of privilege vulnerability exists in the way that Microsoft COM for Windows handles objects in memory, aka 'Microsoft COM for Windows Elevation of Privilege Vulnerability'.
[]
GHSA-px49-45qp-crhj
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
[]
GHSA-hxmr-5gv9-6p8v
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
[]
GHSA-q7r2-4w32-9vg9
Unrestricted file upload vulnerability in pfs.php in Neocrome Seditio 121 and earlier allows remote authenticated users to upload arbitrary PHP code via a filename ending with (1) .php.gif, (2) .php.jpg, or (3) .php.png.
[]
GHSA-9c25-9784-774x
Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
[]
GHSA-8g49-qr25-g5pw
The configuration of NetHack 3.4.3-r1 and earlier, Falcon's Eye 1.9.4a and earlier, and Slash'EM 0.0.760 and earlier on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer overflows and overwrite arbitrary files via symlink attacks.
[]
GHSA-vgq4-vjqj-j4p9
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[]
CVE-2023-35861
A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC.
[ "cpe:2.3:h:supermicro:h12dst-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dst-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13dai-t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13dai-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13ddw-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13ddw-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13deg-oa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13deg-oa:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13deg-oad_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13deg-oad:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13deg-pvc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13deg-pvc:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13deg-qt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13deg-qt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13dei_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13dei:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13dei-t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13dei-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13dem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13dem:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13det-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13det-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13dgu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13dgu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13dsf-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13dsf-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13qeh\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13qeh\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sae:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sae-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sae-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-c-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-c-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-e-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-e-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-h-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-h-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13san-l-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13san-l-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13saq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13saq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sav-lvds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sav-lvds:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sav-ps_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sav-ps:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13saz-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13saz-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13saz-q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13saz-q:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sedw-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sedw-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13seed-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13seed-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13seed-sf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13seed-sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sefr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sefr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sei-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sei-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sei-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sei-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sem-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sem-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sem-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sem-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13set-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13set-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13set-gc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13set-gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sew-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sew-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sew-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sew-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13sra-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13sra-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13srn-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13srn-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13srn-e-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13srn-e-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13srn-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13srn-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13srn-h-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13srn-h-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x13swa-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x13swa-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13dsg-o-cpu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13dsg-o-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13dsg-o-cpu-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13dsg-o-cpu-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13dsh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13dsh:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13sae-mf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13sae-mf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13srd-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13srd-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13ssf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13ssf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13ssh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13ssh:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13ssl-n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13ssl-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13ssl-nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13ssl-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13sst-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13sst-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13sst-gc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13sst-gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h13ssw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h13ssw:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dai-n6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dai-n6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12ddw-a6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12ddw-a6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dgo-6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dgo-6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dgq-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dgq-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dgu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dgu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dhm-6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dhm-6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpd-a6m25_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpd-a6m25:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpfr-an6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpfr-an6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-ar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-ar:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-oa6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-oa6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-oa6-gd2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-oa6-gd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-qbt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-qbt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-qr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-qr:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-qt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-qt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpg-u6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpg-u6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpi-n6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpi-n6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpi-nt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpi-nt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpl-i6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpl-i6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpl-nt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpl-nt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpt-b6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpt-b6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpt-pt46_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpt-pt46:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpt-pt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpt-pt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dpu-6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dpu-6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12dsc-6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12dsc-6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12qch\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12qch\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sae:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sae-5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sae-5:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sca-5f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sca-5f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sca-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sca-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12scq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12scq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12scv-lvds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12scv-lvds:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12scv-w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12scv-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12scz-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12scz-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12scz-qf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12scz-qf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12scz-tln4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12scz-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-10c-sp6f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-10c-sp6f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-10c-spt4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-10c-spt4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-14c-spt8f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-14c-spt8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-16c-spt8f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-16c-spt8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-20c-spt8f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-20c-spt8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-4c-sp6f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-4c-sp6f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-4c-spt4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-4c-spt4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-4c-spt8f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-4c-spt8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-8c-sp6f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-8c-sp6f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-8c-spt4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-8c-spt4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-8c-spt8f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-8c-spt8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sdv-8ce-sp4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sdv-8ce-sp4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spa-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spa-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sped-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sped-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spg-nf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spg-nf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spi-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spi-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spl-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spl-ln4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spl-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spm-ln4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spm-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spm-ln6tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spm-ln6tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spm-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spm-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spo-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spo-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spo-ntf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spo-ntf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spt-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spt-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spt-gc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spt-gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spt-pt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spt-pt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spw-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spw-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spw-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spw-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spz-ln4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spz-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12spz-spln6f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12spz-spln6f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12std-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12std-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12ste-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12ste-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sth-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sth-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sth-ln4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sth-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12sth-sys_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12sth-sys:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stl-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stl-if_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stl-if:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-c-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-c-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-e-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-e-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-h-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-h-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stn-l-wohs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stn-l-wohs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stw-f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stw-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x12stw-tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x12stw-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-ntr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-ntr:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-ntl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-ntl:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-inr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-inr:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-inl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-inl:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-in_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-in:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssw-an6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssw-an6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12sst-ps_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12sst-ps:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssl-nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssl-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssl-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssl-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssl-ct_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssl-ct:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssl-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssl-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssg-anp6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssg-anp6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssg-an6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssg-an6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssfr-an6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssfr-an6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12ssff-an6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12ssff-an6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dsu-inr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dsu-inr:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dsu-in_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dsu-in:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dst-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dsi-nt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dsi-nt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dsi-n6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dsi-n6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dsg-q-cpu6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dsg-q-cpu6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dsg-o-cpu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dsg-o-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dgq-nt6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dgq-nt6:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:h12dgo-6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h12dgo-6:-:*:*:*:*:*:*:*" ]
GHSA-xf3m-4rm6-x2hr
PQI AirCard has persistent XSS
[]