Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2008-4867
Buffer overflow in libavcodec/dca.c in FFmpeg 0.4.9 before r14917, as used by MPlayer, allows context-dependent attackers to have an unknown impact via vectors related to an incorrect DCA_MAX_FRAME_SIZE value.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" ]
GHSA-xgvh-4wv3-f5h2
In camera isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07085486; Issue ID: ALPS07085486.
[]
GHSA-352j-2x5m-wf94
HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product.
[]
CVE-2012-2585
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine ServiceDesk Plus 8.1 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, or (4) a crafted SRC attribute of an IFRAME element, or an e-mail message subject with (5) a SCRIPT element, (6) a CSS expression property in the STYLE attribute of an arbitrary element, (7) a crafted SRC attribute of an IFRAME element, (8) a crafted CONTENT attribute of an HTTP-EQUIV="refresh" META element, or (9) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element.
[ "cpe:2.3:a:manageengine:servicedesk_plus:8.1:*:*:*:*:*:*:*" ]
GHSA-67hf-6rcg-6p33
The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file.
[]
CVE-2012-3175
Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a different vulnerability than CVE-2012-0518.
[ "cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:*" ]
CVE-2014-2138
CRLF injection vulnerability in the web framework in Cisco Security Manager 4.2 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct redirection attacks via a crafted URL, aka Bug ID CSCun82349.
[ "cpe:2.3:a:cisco:security_manager:*:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.1.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2:sp2:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.2:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.2:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.2:sp2:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.2:sp3:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2.2:sp4:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3:sp2:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3.1:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.3.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:4.1:sp2:*:*:*:*:*:*" ]
GHSA-p5rm-chg6-p3j7
The AMD Ryzen and Ryzen Pro processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-2, RYZENFALL-3, and RYZENFALL-4.
[]
CVE-2017-8561
Windows kernel in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
CVE-2020-28692
In Gila CMS 1.16.0, an attacker can upload a shell to tmp directy and abuse .htaccess through the logs function for executing PHP files.
[ "cpe:2.3:a:gilacms:gila_cms:1.16.0:*:*:*:*:*:*:*" ]
CVE-2018-14361
An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*" ]
GHSA-qrgr-qfr9-4xfh
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
[]
CVE-2020-3358
Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability
A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.
[ "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*" ]
CVE-2003-1489
upload.php in Truegalerie 1.0 allows remote attackers to read arbitrary files by specifying the target filename in the file cookie in form.php, then downloading the file from the image gallery.
[ "cpe:2.3:a:truegalerie:truegalerie:1.0:*:*:*:*:*:*:*" ]
CVE-2008-3047
Incomplete blacklist vulnerability in the KB Unpack (kb_unpack) extension 0.1.0 and earlier for TYPO3 has unknown impact and attack vectors.
[ "cpe:2.3:a:typo3:kb_unpack_extension:*:*:*:*:*:*:*:*" ]
CVE-2023-25960
WordPress Zendrop – Global Dropshipping Plugin <= 1.0.0 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop – Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0.
[ "cpe:2.3:a:zendrop:zendrop:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:zendrop:zendrop:1.0.0:*:*:*:*:wordpress:*:*" ]
GHSA-g7cg-63c8-8whr
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, can cause the bounds of a for loop to be miscalculated, which leads to a use after free condition a pointer is pushed into previously free memory by the loop.
[]
GHSA-vcm8-mcfj-6qg5
Unspecified vulnerability in iostat in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown vectors related to an "environment variable handling error."
[]
GHSA-364f-83pm-pm23
A flaw was found in privoxy before 3.0.32. Invalid memory access with an invalid pattern passed to pcre_compile() may lead to denial of service.
[]
CVE-2024-46586
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sCloudPass parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ "cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*" ]
CVE-2020-27254
Emerson Rosemount X-STREAM Gas AnalyzerX-STREAM enhanced XEGP, XEGK, XEFD, XEXF – all revisions, The affected products are vulnerable to improper authentication for accessing log and backup data, which could allow an attacker with a specially crafted URL to obtain access to sensitive information.
[ "cpe:2.3:o:emerson:x-stream_enhanced_xegp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:x-stream_enhanced_xegp:-:*:*:*:*:*:*:*", "cpe:2.3:o:emerson:x-stream_enhanced_xegk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:x-stream_enhanced_xegk:-:*:*:*:*:*:*:*", "cpe:2.3:o:emerson:x-stream_enhanced_xefd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:x-stream_enhanced_xefd:-:*:*:*:*:*:*:*", "cpe:2.3:o:emerson:x-stream_enhanced_xexf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:x-stream_enhanced_xexf:-:*:*:*:*:*:*:*" ]
CVE-2017-14321
Multiple cross-site scripting (XSS) vulnerabilities in the administrative interface in Mirasvit Helpdesk MX before 1.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) customer name or (2) subject in a ticket.
[ "cpe:2.3:a:mirasvit:helpdesk_mx:*:*:*:*:*:*:*:*" ]
CVE-2024-34561
WordPress Real3D Flipbook PDF Viewer Lite plugin <= 3.71 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative interactive media 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin allows Stored XSS.This issue affects 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin: from n/a through 3.71.
[]
GHSA-q397-j87x-7vrj
The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a Denial of Service (DoS) via a crafted input.
[]
CVE-2008-0233
Unrestricted file upload vulnerability in Zero CMS 1.0 Alpha and earlier allows remote attackers to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg.
[ "cpe:2.3:a:zero_cms:zero_cms:1.0_alpha:*:*:*:*:*:*:*" ]
GHSA-26px-c4h6-78fc
In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
[]
CVE-2025-24870
Insecure Key & Secret Management vulnerability in SAP GUI for Windows
SAP GUI for Windows & RFC service credentials are incorrectly stored in the memory of the program allowing an unauthenticated attacker to access information within systems, resulting in privilege escalation. On successful exploitation, this could result in disclosure of highly sensitive information. This has no impact on integrity, and availability.
[]
CVE-2023-28851
Silverstripe Form Capture vulnerable to Stored Cross-Site Scripting
Silverstripe Form Capture provides a method to capture simple silverstripe forms and an admin interface for users. Starting in version 0.2.0 and prior to versions 1.0.2, 1.1.0, 2.2.5, and 3.1.1, improper escaping when presenting stored form submissions allowed for an attacker to perform a Cross-Site Scripting attack. The vulnerability was initially patched in version 1.0.2, and version 1.1.0 includes this patch. The bug was then accidentally re-introduced during a merge error, and has been re-patched in versions 2.2.5 and 3.1.1. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:bigfork:silverstripe_form_capture:*:*:*:*:*:*:*:*", "cpe:2.3:a:bigfork:silverstripe_form_capture:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:bigfork:silverstripe_form_capture:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bigfork:silverstripe_form_capture:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bigfork:silverstripe_form_capture:3.1.0:*:*:*:*:*:*:*" ]
GHSA-wpp7-4crq-f956
Broker FTP Server 5.9.5.0 allows a remote attacker to cause a denial of service by repeatedly issuing an invalid CD or CWD ("CD . .") command.
[]
GHSA-xrmc-6wqq-99wc
The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).
[]
GHSA-rjjv-98pw-hc2c
A directory traversal vulnerability on Mercury MAC1200R devices allows attackers to read arbitrary files via a web-static/ URL.
[]
GHSA-7qqg-m879-q5xj
Incorrect default permissions in some Intel(R) GPA software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
GHSA-6w3j-vqwj-vw36
Vulnerability in the Oracle Communications Messaging Server component of Oracle Communications Applications (subcomponent: Web Client). The supported version that is affected is 3.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Messaging Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Messaging Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Messaging Server accessible data as well as unauthorized read access to a subset of Oracle Communications Messaging Server accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
GHSA-qhhg-f5q2-j9gj
AnyDesk 7.0.8 allows remote Denial of Service.
[]
CVE-2024-21039
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:12.2.3-12.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:*:*:*:*:*:*:*:*" ]
GHSA-q837-4wvg-jx7g
In malidp_mw_connector_reset, new memory is allocated with kzalloc, but no check is performed. In order to prevent null pointer dereferencing, ensure that mw_state is checked before calling __drm_atomic_helper_connector_reset.
[]
GHSA-h2jr-f722-chc2
The Samsung A3 Android device with a build fingerprint of samsung/a3y17ltedx/a3y17lte:8.0.0/R16NW/A320YDXU4CSB3:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[]
CVE-2022-0615
Use-after-free vulnerability in ESET products for Linux
Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system.
[ "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux_kernel:*:*", "cpe:2.3:a:eset:server_security:*:*:*:*:*:linux_kernel:*:*" ]
GHSA-w7rr-g4c2-26cq
The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Route Information packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Route Information Vulnerability."
[]
GHSA-crh5-vv2v-c82q
@claviska/jquery-minicolors vulnerable to Cross-site Scripting
jQuery MiniColors is a color picker built on jQuery. Prior to version 2.3.6, jQuery MiniColors is prone to cross-site scripting when handling untrusted color names. This issue is patched in version 2.3.6.
[]
GHSA-mh9g-743p-49cw
GitLab 10.7 and later through 12.7.2 has Incorrect Access Control.
[]
GHSA-27vr-8fpq-79vm
A permissions issue existed. This issue was addressed with improved permission validation. This issue affected versions prior to iOS 12.
[]
CVE-2009-0385
Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*" ]
GHSA-v7hp-7j8c-xrp4
Inadequate encryption strength for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
[]
CVE-2001-0728
Buffer overflow in Compaq Management Agents before 5.2, included in Compaq Web-enabled Management Software, allows local users to gain privileges.
[ "cpe:2.3:a:compaq:management_agents:*:*:*:*:*:*:*:*" ]
GHSA-mxc5-wqq4-5j7m
In FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
[]
CVE-2012-4751
Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11 allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with whitespace before a javascript: URL in the SRC attribute of an element, as demonstrated by an IFRAME element.
[ "cpe:2.3:a:otrs:otrs:2.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:otrs:otrs:3.1.10:*:*:*:*:*:*:*" ]
CVE-2017-12904
Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item that includes shell code in its title and/or URL.
[ "cpe:2.3:a:newsbeuter:newsbeuter:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:newsbeuter:newsbeuter:2.9:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2001-0786
Internet Software Solutions Air Messenger LAN Server (AMLServer) 3.4.2 stores user passwords in plaintext in the pUser.Dat file.
[ "cpe:2.3:a:internet_software_solutions:air_messenger_lan_server:3.4.2:*:*:*:*:*:*:*" ]