Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2023-38251
Adobe Commerce | Uncontrolled Resource Consumption (CWE-400)
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a Uncontrolled Resource Consumption vulnerability that could lead in minor application denial-of-service. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*" ]
CVE-2002-1994
advserver.exe in Advanced Web Server (AdvServer) Professional 1.030000 allows remote attackers to cause a denial of service via multiple HTTP requests containing a single carriage return/line feed (CRLF) sequence.
[ "cpe:2.3:a:gamecheats:advanced_web_server_professional:1.030000:*:*:*:*:*:*:*" ]
CVE-2019-6527
PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) may allow an attacker to be able to change the password for an admin user who is currently or previously logged in, provided the device has not been restarted.
[ "cpe:2.3:o:kunbus:pr100088_modbus_gateway_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:kunbus:pr100088_modbus_gateway:-:*:*:*:*:*:*:*" ]
CVE-2019-2958
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-6w26-wxr6-7mxw
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "IOFireWireAVC" component. It allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
[]
GHSA-g7jc-5wm7-65m8
Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz48614, the "SCCP Packet Processing Denial of Service Vulnerability."
[]
GHSA-3xj4-h992-28fw
Vulnerability in a system call in BSDI 3.0 and 3.1 allows local users to cause a denial of service (reboot) in the kernel via a particular sequence of instructions.
[]
GHSA-fx9q-pwrj-mfh7
When a new Firefox profile is created on 64-bit Windows installations, the sandbox for 64-bit NPAPI plugins is not enabled by default. Note: This issue only affects 64-bit Windows. 32-bit Windows and other operating systems are unaffected. This vulnerability affects Firefox < 50.
[]
GHSA-jvf5-q4h5-2jmj
Prototype Pollution in madlib-object-utils
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
[]
GHSA-8p72-9pfr-qv59
Partial Links 1.2.2 allows remote attackers to obtain sensitive information via a direct request to (1) page_footer.php and (2) page_header.php, which displays the path in an error message.
[]
GHSA-mfg2-g3m8-3wmh
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
CVE-2024-11859
DLL Search Order Hijacking in ESET products for Windows
DLL Search Order Hijacking vulnerability potentially allowed an attacker with administrator privileges to load a malicious dynamic-link library and execute its code.
[]
CVE-2017-10857
Cybozu Office 10.0.0 to 10.6.1 allows authenticated attackers to bypass access restriction to perform arbitrary actions via "Cabinet" function.
[ "cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:office:10.6.1:*:*:*:*:*:*:*" ]
GHSA-96m5-5pf8-2pwf
The Linux kernel 2.6.9 through 2.6.17 on the x86_64 and amd64 platforms allows local users to cause a denial of service (panic) via a 32-bit application that calls mprotect on its Virtual Dynamic Shared Object (VDSO) page and then triggers a segmentation fault.
[]
GHSA-f54v-wcj4-v4cc
Online Blood Donation Management System v1.0 is vulnerable to multiple Store Cross-Site Scripting vulnerabilities. The 'city' parameter of the users/register.php resource is copied into the users/member.php document as plain text between tags. Any input is echoed unmodified in the users/member.php response.
[]
GHSA-vpj4-89q8-rh38
Cross-Site Scripting in bpmn-js-properties-panel
Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.RecommendationUpgrade to version 0.31.0 or later.
[]
CVE-2024-47333
WordPress Loops & Logic plugin <= 4.1.4 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Tangible Loops & Logic allows Reflected XSS.This issue affects Loops & Logic: from n/a through 4.1.4.
[]
GHSA-p2rg-994v-hfw8
Stack-based buffer overflow in CFNetwork in Apple iOS before 4 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to URL handling.
[]
CVE-2002-0685
Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message.
[ "cpe:2.3:a:pgp:desktop_security:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:pgp:freeware:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:pgp:personal_security:7.0.3:*:*:*:*:*:*:*" ]
GHSA-xw37-57qp-9mm4
Consensus flaw during block processing in github.com/ethereum/go-ethereum
ImpactA consensus-vulnerability in Geth could cause a chain split, where vulnerable versions refuse to accept the canonical chain.DescriptionA flaw was repoted at 2020-08-11 by John Youngseok Yang (Software Platform Lab), where a particular sequence of transactions could cause a consensus failure.Tx 1:`sender` invokes `caller`.`caller` invokes `0xaa`. `0xaa` has 3 wei, does a self-destruct-to-self`caller` does a `1 wei` -call to `0xaa`, who thereby has 1 wei (the code in `0xaa` still executed, since the tx is still ongoing, but doesn't redo the selfdestruct, it takes a different path if callvalue is non-zero)Tx 2:`sender` does a 5-wei call to 0xaa. No exec (since no code).In geth, the result would be that `0xaa` had `6 wei`, whereas OE reported (correctly) `5` wei. Furthermore, in geth, if the second tx was not executed, the `0xaa` would be destructed, resulting in `0 wei`. Thus obviously wrong.It was determined that the root cause was this [commit](https://github.com/ethereum/go-ethereum/commit/223b950944f494a5b4e0957fd9f92c48b09037ad) from [this PR](https://github.com/ethereum/go-ethereum/pull/19953). The semantics of `createObject` was subtly changd, into returning a non-nil object (with `deleted=true`) where it previously did not if the account had been destructed. This return value caused the new object to inherit the old `balance`:It was determined that the minimal possible correct fix wasPatchesSee above. The fix was included in Geth `v1.9.20` "Paragade".CreditsThe bug was found by @johnyangk and reported via [email protected] more informationIf you have any questions or comments about this advisory:Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)Email us at [[email protected]](mailto:[email protected])
[]
GHSA-4fvm-c367-wg98
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security parameter at /goform/WifiBasicSet.
[]
CVE-2024-2401
The Admin Page Spider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
CVE-1999-0385
The LDAP bind function in Exchange 5.5 has a buffer overflow that allows a remote attacker to conduct a denial of service or execute commands.
[ "cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*" ]
GHSA-462j-78vj-jjpr
A vulnerability has been identified in SCALANCE W780 and W740 (IEEE 802.11n) family (All versions < V6.3). Sending specially crafted packets through the ARP protocol to an affected device could cause a partial denial-of-service, preventing the device to operate normally for a short period of time.
[]
CVE-2013-3507
The NeDi component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to obtain sensitive information via a direct request for (1) a configuration file, (2) a database dump, or (3) the Tomcat status context.
[ "cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:*" ]
GHSA-3m58-3m5q-53hq
Incorrect Access Control in Lin-CMS-Flask v0.1.1 allows remote attackers to obtain sensitive information and/or gain privileges due to the application not invalidating a user's authentication token upon logout, which allows for replaying packets.
[]
CVE-2021-1211
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*" ]
GHSA-jv4m-wm77-j9vv
Buffer overflow in the remote console (rcon) in Battlefield 1942 1.2 and 1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long user name and password.
[]
GHSA-9r6x-p466-xgr6
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.1. An app may be able to execute arbitrary code with kernel privileges.
[]
GHSA-j8cr-2gxr-hvvj
manifests/base.pp in the puppetlabs-cinder module, as used in PackStack, uses world-readable permissions for the (1) cinder.conf and (2) api-paste.ini configuration files, which allows local users to read OpenStack administrative passwords by reading the files.
[]
CVE-2006-1775
Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.19 allow remote attackers to inject arbitrary web script or HTML via the (1) Site Description field in (a) admin_board.php, the (2) Group name and (3) Group description fields in (b) admin_groups.php and (c) groupcp.php, the (4) Theme Name field in (d) admin_styles.php, and the (5) Rank Title field in (e) admin_ranks.php. NOTE: the profile.php/Current password vector is already covered by CVE-2006-1603.
[ "cpe:2.3:a:phpbb_group:phpbb:2.0.19:*:*:*:*:*:*:*" ]
GHSA-9jfp-qq8j-mcj5
PHP Scripts Mall PHP Multivendor Ecommerce has SQL Injection via the seller-view.php usid parameter.
[]
CVE-2009-2577
Opera 9.52 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption, and application hang) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*" ]
CVE-2020-1383
Windows RRAS Service Information Disclosure Vulnerability
An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routing and Remote Access enabled. Routing and Remote Access is a non-default configuration; systems without it enabled are not vulnerable. The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-4pm8-5w34-q28w
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in formsintegrations Integrations of Zoho CRM with Elementor form allows Phishing. This issue affects Integrations of Zoho CRM with Elementor form: from n/a through 1.0.7.
[]
CVE-2021-22912
Nextcloud iOS before 3.4.2 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only on the local Nextcloud server unless a global search has been explicitly chosen by the user.
[ "cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*" ]
CVE-2024-51901
WordPress Smooth Maps plugin <= 1.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wojciech Borowicz Smooth Maps allows Stored XSS.This issue affects Smooth Maps: from n/a through 1.1.
[]
CVE-2024-26673
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - Disallow families other than NFPROTO_{IPV4,IPV6,INET}. - Disallow layer 4 protocol with no ports, since destination port is a mandatory attribute for this object.
[]
GHSA-cxrr-h279-673f
A logic issue was addressed with improved checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Location data may be shared via iCloud links even if Location metadata is disabled via the Share Sheet.
[]
CVE-2012-2242
scripts/dget.pl in devscripts before 2.10.73 allows remote attackers to execute arbitrary commands via a crafted (1) .dsc or (2) .changes file, related to "arguments to external commands" that are not properly escaped, a different vulnerability than CVE-2012-2240.
[ "cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze1:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze2:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze3:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze4:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.70:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.71:*:*:*:*:*:*:*" ]
GHSA-293j-h7h4-4rp5
Cross-site scripting (XSS) vulnerability in setup.php in Audins Audiens 3.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2024-29102
WordPress Extensions For CF7 plugin <= 3.0.6 - Unauthenticated Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes Extensions For CF7 allows Stored XSS.This issue affects Extensions For CF7: from n/a through 3.0.6.
[]
CVE-2020-22200
Directory Traversal vulnerability in phpCMS 9.1.13 via the q parameter to public_get_suggest_keyword.
[ "cpe:2.3:a:phpcms:phpcms:9.1.13:*:*:*:*:*:*:*" ]
GHSA-qc6x-3767-556f
In the Linux kernel, the following vulnerability has been resolved:net: ethtool: netlink: Allow NULL nlattrs when getting a phy_deviceethnl_req_get_phydev() is used to lookup a phy_device, in the case an ethtool netlink command targets a specific phydev within a netdev's topology.It takes as a parameter a const struct nlattr *header that's used for error handling :In the notify path after a ->set operation however, there's no request attributes available.The typical callsite for the above function looks like:So, when tb is NULL (such as in the ethnl notify path), we have a nice crash.It turns out that there's only the PLCA command that is in that case, as the other phydev-specific commands don't have a notification.This commit fixes the crash by passing the cmd index and the nlattr array separately, allowing NULL-checking it directly inside the helper.
[]
CVE-2016-4847
Cross-site scripting (XSS) vulnerability in site/search.php in OSSEC Web UI before 0.9 allows remote attackers to inject arbitrary web script or HTML by leveraging an unanchored regex.
[ "cpe:2.3:a:ossec:web_ui:*:*:*:*:*:*:*:*" ]
GHSA-236p-gvjj-h5mq
A maliciously crafted PICT, BMP, PSD or TIF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 may be used to write beyond the allocated buffer while parsing PICT, BMP, PSD or TIF file. This vulnerability may be exploited to execute arbitrary code.
[]
GHSA-8wx2-v65v-5x9x
IBM Cognos Analytics Mobile for Android applications prior to version 1.1.14 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 215592.
[]
CVE-2014-1836
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.
[ "cpe:2.3:a:impresscms:impresscms:*:*:*:*:*:*:*:*" ]
GHSA-j77p-7hff-qw5r
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yamna Khawaja Mailing Group Listserv allows SQL Injection.This issue affects Mailing Group Listserv: from n/a through 2.0.9.
[]
CVE-2021-45566
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
[ "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*" ]
GHSA-rvxf-v654-8h92
Multiple SQL injection vulnerabilities in admin/index.php in VideoScript.us YouTube Video Script allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.
[]
CVE-2016-1000342
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
[ "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-6mx8-m8xp-f2vc
ComfyUI-Impact-Pack is vulnerable to Path Traversal. The issue stems from missing validation of the `image.filename` field in a POST request sent to the `/upload/temp` endpoint added by the extension to the server. This results in writing arbitrary files to the file system which may, under some conditions, result in remote code execution (RCE).
[]
GHSA-347g-qwhw-vvpj
Cross-site scripting (XSS) vulnerability in action_admin/member.php in Invision Power Board (IPB) 2.1.7 and earlier allows remote authenticated users to inject arbitrary web script or HTML via a reference to a script in the avatar setting, which can be leveraged for a cross-site request forgery (CSRF) attack involving forced SQL execution by an admin.
[]
GHSA-6qhx-mg23-q6c6
The SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, has several denial-of-service vulnerabilities that allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
[]
GHSA-25m7-rwwf-46f2
Foxit PDF Reader Annotation Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22707.
[]
GHSA-6627-4m3v-x6v4
IBM WebSphere Portal 6.0 through 6.0.1.7, 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0 through 7.0.0.2 CF25, and 8.0 through 8.0.0.1 CF08 allows remote attackers to read arbitrary files via a modified URL.
[]
GHSA-p5mh-4p35-558w
Multiple SQL vulnerabilities exist in planning.php, user_list.php, projets.php, user_groupes.php, and groupe_list.php in Simple Online Planning (SOPPlanning)before 1.33.
[]
CVE-2019-3764
Dell EMC iDRAC7 versions prior to 2.65.65.65, iDRAC8 versions prior to 2.70.70.70 and iDRAC9 versions prior to 3.36.36.36 contain an improper authorization vulnerability. A remote authenticated malicious iDRAC user with low privileges may potentially exploit this vulnerability to obtain sensitive information such as password hashes.
[ "cpe:2.3:o:dell:idrac7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:idrac8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:idrac9_firmware:*:*:*:*:*:*:*:*" ]
GHSA-rmc4-3j8x-2r79
The Tourfic – Ultimate Hotel Booking, Travel Booking & Apartment Booking WordPress Plugin | WooCommerce Booking plugin for WordPress is vulnerable to SQL Injection via the 'enquiry_id' parameter of the 'tf_enquiry_reply_email_callback' function in all versions up to, and including, 2.15.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
CVE-2023-32655
Path transversal in some Intel(R) NUC Kits & Mini PCs - NUC8i7HVK & NUC8HNK USB Type C power delivery controller installatio software before version 1.0.10.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:nuc_kits_and_mini_pcs_nuc8i7hvk_nuc8hnk_usb_type_c_powe_delivery_controller_installation_software:nuc_kits_and_mini_pcs_nuc8i7hvk_nuc8hnk_usb_type_c_powe_delivery_controller_installation_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:usb_type_c_power_delivery_controller:*:*:*:*:*:windows:*:*", "cpe:2.3:h:intel:nuc_8_business_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*" ]
GHSA-m2p5-p64f-w8gx
AP4_VisualSampleEntry::ReadFields in Core/Ap4SampleEntry.cpp in Bento4 1.5.0-617 uses incorrect character data types, which causes a stack-based buffer underflow and out-of-bounds write, leading to denial of service (application crash) or possibly unspecified other impact.
[]
CVE-2022-25709
Use of Out-of-range Pointer Offset in Data Modem
Memory corruption in modem due to use of out of range pointer offset while processing qmi msg
[ "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd7c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd7c:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx70m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx70m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
CVE-2010-5247
Untrusted search path vulnerability in QtWeb Browser 3.3 build 043 allows local users to gain privileges via a Trojan horse wintab32.dll file in the current working directory, as demonstrated by a directory that contains a .html, .htm, or .mhtml file. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:qtweb:qtweb:3.3:*:*:*:*:*:*:*" ]
GHSA-r9j8-fv6p-qhj6
This issue was addressed with improved entitlements. This issue is fixed in macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to bypass Privacy preferences
[]
CVE-2022-34219
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
CVE-2023-6975
Path Traversal: '\..\filename'
A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
[ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ]
CVE-2024-36377
In JetBrains TeamCity before 2024.03.2 certain TeamCity API endpoints did not check user permissions
[]
CVE-2014-1305
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*" ]
GHSA-ffv8-x822-fx73
Jenkins TestFairy Plugin stores credentials in plain text
Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
[]
GHSA-vw5m-894x-7rp4
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall. This vulnerability affected SonicOS Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.
[]
GHSA-8qm9-hxp3-h3fp
Improper authentication for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.
[]
CVE-2019-4497
IBM Jazz Reporting Service (JRS) 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, and 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 164118.
[ "cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.6.1:*:*:*:*:*:*:*" ]
GHSA-pw97-grw5-hp3h
The CRM Perks Forms plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'handle_uploaded_files' function in versions up to, and including, 1.1.3. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
CVE-2019-6440
Zemana AntiMalware before 3.0.658 Beta mishandles update logic.
[ "cpe:2.3:a:zemana:antimalware:2.1.1.353:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.1.1.543:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.1.1.621:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.1.1.929:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.2.1.105:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.2.1.234:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.2.1.460:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.4.1.100:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.5.1.257:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.5.1.329:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.5.2.256:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.6.1.430:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.6.1.436:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.7.2.440:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.8.1.971:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.9.1.402:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.9.1.440:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.9.1.467:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.9.1.918:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.9.1.944:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.10.1.17:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.10.1.18:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.10.1.774:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.10.1.895:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.1.9:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.1.62:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.1.366:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.1.514:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.2.62:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.2.366:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.11.2.514:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.14.1.667:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.14.1.982:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.14.2.667:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.157:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.206:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.229:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.544:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.600:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.677:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.721:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.836:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.1.840:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.2.206:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.2.229:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.15.2.721:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.67:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.94:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.198:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.292:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.558:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.633:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.716:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.886:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.1.938:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.2.198:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.2.292:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.2.558:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.2.633:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.16.2.938:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.33:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.82:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.100:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.116:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.839:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.906:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.916:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.1.985:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.2.33:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.17.2.116:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.19:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.90:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.101:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.135:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.231:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.254:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.263:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.372:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.438:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.462:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.466:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.1.519:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.2.263:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.2.438:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.2.519:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.2.634:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.18.2.634:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.502:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.638:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.659:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.703:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.713:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.737:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.783:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.797:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.808:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.842:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.844:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.852:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.887:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.892:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.904:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.1.906:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.638:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.737:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.797:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.808:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.842:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.844:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.852:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.19.2.904:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.8:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.73:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.90:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.100:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.112:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.140:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.425:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.539:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.562:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.600:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.613:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.687:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.729:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.750:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.776:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.905:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.911:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.1.985:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.100:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.112:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.140:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.572:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.613:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.905:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.911:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.20.2.985:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.6:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.13:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.15:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.16:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.18:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.29:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.81:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.94:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.139:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.180:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.247:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.261:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.308:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.321:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.465:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1.527:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.29:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.81:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.87:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.87:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.94:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.139:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.180:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.247:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.278:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.321:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.2.465:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.21.1278:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.1.19:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.1.20:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.1.35:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.1.37:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.1.69:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.1.75:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.2.37:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.30.2.57:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.34:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.38:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.52:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.67:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.72:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.76:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.80:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.83:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.92:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.1.133:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.67:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.72:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.76:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.80:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.83:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.92:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.50.2.133:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.60.1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.60.1.63:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.60.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.25:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.118:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.127:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.132:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.133:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.177:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.201:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.228:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.229:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.244:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.262:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.312:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.341:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.352:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.415:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.439:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.442:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.576:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.1.591:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.118:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.244:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.262:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.312:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.341:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.352:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.439:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.442:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.576:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.70.2.591:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.71.1.139:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.101:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.176:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.324:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.327:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.345:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.380:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.1.388:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.2.101:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.2.176:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.2.324:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.2.327:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.2.345:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.72.2.388:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.73.1.2:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.73.1.36:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.73.1.38:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.73.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.73.2.36:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.73.2.38:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.1.4:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.1.49:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.1.76:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.1.145:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.1.150:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.2.49:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.2.76:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:2.74.2.150:*:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.492:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.495:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.500:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.590:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.597:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.610:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.616:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.617:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.633:beta:*:*:*:*:*:*", "cpe:2.3:a:zemana:antimalware:3.0.640:beta:*:*:*:*:*:*" ]
CVE-2023-34155
Vulnerability of unauthorized calling on HUAWEI phones and tablets.Successful exploitation of this vulnerability may affect availability.
[ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ]
CVE-2023-21368
In Audio, there is a possible out of bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
CVE-2008-3787
SQL injection vulnerability in listing_view.php in Web Directory Script 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the name parameter.
[ "cpe:2.3:a:nullscripts:web_directory_script:*:*:*:*:*:*:*:*" ]
CVE-2007-5162
The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
[ "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*" ]
CVE-2018-5892
The Touch Pal application can collect user behavior data without awareness by the user in Snapdragon Mobile and Snapdragon Wear.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*" ]
CVE-2022-23747
In Sony Xperia series 1, 5, and Pro, an out of bound memory access can occur due to lack of validation of the number of frames being passed during music playback.
[ "cpe:2.3:o:sony:xperia_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xperia_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:xperia_5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xperia_5:-:*:*:*:*:*:*:*", "cpe:2.3:o:sony:xperia_pro_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xperia_pro:-:*:*:*:*:*:*:*" ]
GHSA-f26q-x9wv-632w
Windows Hyper-V Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22009, CVE-2022-23257, CVE-2022-24537.
[]
GHSA-8cmg-37qm-wxhr
A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
[]
GHSA-7777-xf98-rh9v
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Word, Word, Microsoft Office, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8157, CVE-2018-8158.
[]
GHSA-hmj3-cm5q-2jpw
Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.
[]
GHSA-jj5m-2m9j-hxjw
If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack.
[]
GHSA-454x-h9g9-7vmj
A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash.
[]
CVE-2019-5941
Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction alter the Report without access privileges via the application 'Multi Report'.
[ "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*" ]
CVE-2020-12127
An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.
[ "cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*", "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*" ]
GHSA-pvm2-wchq-hwv5
An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The Dropbear SSH daemon has been modified to accept an alternate hard-coded path to a public key that allows root access. This key is stored in a /rom location that cannot be modified by the device owner.
[]
CVE-2024-35916
dma-buf: Fix NULL pointer dereference in sanitycheck()
In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mock_chain() returns NULL, it is passed to dma_fence_enable_sw_signaling() resulting in NULL pointer dereference there. Call dma_fence_enable_sw_signaling() only if mock_chain() succeeds. Found by Linux Verification Center (linuxtesting.org) with SVACE.
[]
GHSA-qq4x-fwvx-7q2h
Cross-site scripting (XSS) vulnerability in configuration/httpListenerEdit.jsf in the GlassFish 2 UR2 b04 webadmin interface in Sun Java System Application Server 9.1_01 build b09d-fcs and 9.1_02 build b04-fcs allows remote attackers to inject arbitrary web script or HTML via the name parameter, a different vector than CVE-2008-2751.
[]
GHSA-876j-4j97-w5j7
In the module "Product Catalog (CSV, Excel, XML) Export PRO" (exportproducts) in versions up to 5.0.0 from MyPrestaModules for PrestaShop, a guest can perform SQL injection via `exportProduct::_addDataToDb().`
[]
GHSA-9rpc-qxwj-wqvg
Car Rental Management System v1.0 is vulnerable to Arbitrary code execution via ip/car-rental-management-system/admin/ajax.php?action=save_settings.
[]
CVE-2017-11344
Global buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to write shellcode at any address in the heap; this can be used to execute arbitrary code on the router by hosting a crafted device description XML document at a URL specified within a Location header in an SSDP response.
[ "cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac66u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac58u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac58u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac55u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac55u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac52u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac52u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac51u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac51u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n18u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n18u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n66u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n66u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n56u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n56u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt_ac1200gu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt_ac1200gu:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt_ac1200g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt_ac1200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac1200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-ac53_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-ac53:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n12hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_b1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n12hp_b1:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n12d1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n12d1:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n12\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n12\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt_n12\\+_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt_n12\\+_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n16:-:*:*:*:*:*:*:*", "cpe:2.3:o:asuswrt-merlin_project:rt-n300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asuswrt-merlin_project:rt-n300:-:*:*:*:*:*:*:*" ]
CVE-2005-1005
ProfitCode PayProCart 3.0 allows remote attackers to bypass authentication and gain administrative privileges to the admin control panel, as demonstrated via a direct request to adminshop/index.php with hex-encoded .. sequences in the ftoedit parameter.
[ "cpe:2.3:a:profitcode:payprocart:3.0:*:*:*:*:*:*:*" ]
GHSA-5p26-q4vq-vrm2
Multiple cross-site scripting (XSS) vulnerabilities in Adiscon LogAnalyzer before 3.6.6 allow remote attackers to inject arbitrary web script or HTML via the hostname in (1) index.php or (2) detail.php.
[]
GHSA-w7w5-frm9-65qv
The ValidateUserLogon function in provider/libserver/ECSession.cpp in Zarafa 7.1.8, 6.20.0, and earlier, when using certain build conditions, allows remote attackers to cause a denial of service (crash) via vectors related to "a NULL pointer of the password."
[]
GHSA-2f9m-9655-mxcg
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
[]
CVE-2012-2890
Use-after-free vulnerability in the PDF functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*" ]