id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-gjjv-943h-wj4x | : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the LDAP cbURL parameter of Telos Automated Message Handling System allows a remote attacker to inject arbitrary script into an AMHS session. This issue affects: Telos Automated Message Handling System versions prior to 4.1.5.5. | []
|
|
GHSA-whff-mwfj-4g3f | SQL injection vulnerability in index.cfm in ColdGen ColdBookmarks 1.22 allows remote attackers to execute arbitrary SQL commands via the BookmarkID parameter in an EditBookmark action. | []
|
|
GHSA-3rhr-wf64-3p86 | SugarCRM before 8.0.4 and 9.x before 9.0.2 allows SQL injection in the Administration module by a Developer user. | []
|
|
CVE-2025-7175 | code-projects E-Commerce Site users_photo.php unrestricted upload | A vulnerability was found in code-projects E-Commerce Site 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
|
CVE-2025-2474 | Vulnerability in PCX Image Codec Impacts QNX Software Development Platform | Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec. | []
|
CVE-2023-46646 | Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected GitHub Enterprise Server version 3.7.0 and above and was fixed in version 3.17.19, 3.8.12, 3.9.7 3.10.4, and 3.11.0. | [
"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*"
]
|
|
GHSA-6pjp-9q5v-gp94 | The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name. | []
|
|
GHSA-h2xm-59gc-23mm | TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service without authorization via the telnet_enabled parameter in the setTelnetCfg function. | []
|
|
CVE-2025-48904 | Vulnerability that cards can call unauthorized APIs in the FRS process
Impact: Successful exploitation of this vulnerability may affect availability. | []
|
|
CVE-2022-20417 | In audioTransportsToHal of HidlUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-237288416 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-5010 | WhatsUp Gold TestController multiple information disclosure vulnerabilities | In WhatsUp Gold versions released before 2023.1.3, a vulnerability exists in the TestController functionality. A specially crafted
unauthenticated
HTTP request can lead to a disclosure of sensitive information. | [
"cpe:2.3:a:progress:whatsup_gold:-:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
]
|
CVE-2022-26818 | Windows DNS Server Remote Code Execution Vulnerability | Windows DNS Server Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
]
|
GHSA-mh54-522r-8782 | Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Servlet Container Package. | []
|
|
GHSA-mv57-6xpv-hh6v | SQL injection vulnerability in login.php in IP Reg 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the user_name parameter. | []
|
|
CVE-2021-35633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
]
|
|
GHSA-mxmq-w35f-5fr4 | Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access. | []
|
|
CVE-2006-1479 | Multiple cross-site scripting (XSS) vulnerabilities in Serge Rey gtd-php (aka Getting Things Done) 0.5 allow remote attackers to inject arbitrary web script or HTML via the Description field in (1) newProject.php, (2) newList.php, and (3) newWaitingOn.php; the Title field in (4) newProject.php, (5) newList.php, (6) newWaitingOn.php, (7) newChecklist.php, (8) newContext.php, and (9) newGoal.php; the (10) Category Name field in newCategory.php; the (11) listTitle field in listReport.php; the (12) projectName field in projectReport.php; and the (13) checklistTitle field in checklistReport.php. | [
"cpe:2.3:a:serge_rey:gtd-php:0.5:*:*:*:*:*:*:*"
]
|
|
CVE-2019-5051 | An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability. | [
"cpe:2.3:a:libsdl:sdl2_image:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
]
|
|
CVE-2025-23211 | Tandoor Recipes - SSTI - Remote Code Execution | Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24. | []
|
CVE-2004-0574 | The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. | [
"cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2003:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:server:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:*"
]
|
|
CVE-2008-3917 | Cross-site scripting (XSS) vulnerability in index.php in Ovidentia 6.6.5 allows remote attackers to inject arbitrary web script or HTML via the field parameter in a search action. | [
"cpe:2.3:a:ovidentia:ovidentia:6.6.5:*:*:*:*:*:*:*"
]
|
|
GHSA-hr4g-m2q7-5wxr | Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service. | []
|
|
GHSA-xjxr-9f3w-9hc2 | Prima Systems FlexAir devices allow Unauthenticated Command Injection resulting in Root Remote Code Execution. | []
|
|
GHSA-7p2w-5xvj-v699 | The Intelligent Platform Management Interface (IPMI) implementation in Integrated Management Module (IMM) and Integrated Management Module II (IMM2) on IBM BladeCenter, Flex System, System x iDataPlex, and System x3### servers has a default password for the IPMI user account, which makes it easier for remote attackers to perform power-on, power-off, or reboot actions, or add or modify accounts, via unspecified vectors. | []
|
|
GHSA-7hrh-gg2m-9r66 | The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | []
|
|
GHSA-45pv-27p7-gvfx | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some parts of the web application are not protected against Cross Site Request Forgery (CSRF) attacks. The security vulnerability could be exploited by an attacker that is able to trigger requests of a logged-in user to the application. The vulnerability could allow switching the connectivity state of a user or a device. At the time of advisory publication no public exploitation of this security vulnerability was known. | []
|
|
CVE-2018-14626 | PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. | [
"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*"
]
|
|
CVE-2007-5108 | Unspecified vulnerability in IAC Search & Media ask.com toolbar has unknown impact and remote attack vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine. NOTE: this might be the same issue as CVE-2007-5107. | [
"cpe:2.3:a:ask.com:ask_toolbar:*:*:*:*:*:*:*:*"
]
|
|
GHSA-rfpx-7r27-mgh4 | Stack overflow can occur when SDP is received with multiple payload types in the FMTP attribute of a video M line in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 | []
|
|
GHSA-7wx3-r5h3-p5x3 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | []
|
|
GHSA-67j8-976x-9cmm | Windows Extensible Firmware Interface Security Feature Bypass Vulnerability. | []
|
|
CVE-2021-30786 | A race condition was addressed with improved state handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
|
|
GHSA-mmv4-x29x-3r52 | phpMyFAQ before 2.8.13 allows remote attackers to bypass the CAPTCHA protection mechanism by replaying the request. | []
|
|
GHSA-2jpv-47cx-7mgq | A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the libcommonprod.so binary. | []
|
|
CVE-2007-3670 | Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data." | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
]
|
|
CVE-2014-8661 | The SAP CRM Internet Sales module allows remote attackers to execute arbitrary commands via unspecified vectors. | [
"cpe:2.3:a:sap:customer_relationship_management_internet_sales:-:*:*:*:*:*:*:*"
]
|
|
GHSA-rgcc-23p4-9wq6 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
|
|
CVE-2010-3608 | Multiple SQL injection vulnerabilities in wpQuiz 2.7 allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) password (pw) parameters to (a) admin.php or (b) user.php. | [
"cpe:2.3:a:wire_plastic_design:wpquiz:2.7:*:*:*:*:*:*:*"
]
|
|
GHSA-p594-wh4r-v877 | Insufficient session timeout vulnerability in the FAST3686 V2 Vodafone router from Sagemcom. This vulnerability could allow a local attacker to access the administration panel without requiring login credentials. This vulnerability is possible because the 'Login.asp and logout.asp' files do not handle session details correctly. | []
|
|
GHSA-8g8v-256r-57v7 | The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | []
|
|
CVE-2025-30714 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N). | []
|
|
GHSA-ch75-4hc2-84c6 | Cross site scripting (XSS) vulnerability in DiscuzX 3.4 allows attackers to execute arbitrary code via the datetline, title, tpp, or username parameters via the audit search. | []
|
|
GHSA-3j77-7r45-wfxw | Microsoft Internet Explorer 6.0 SP1 and earlier allows remote attackers to cause a denial of service (crash) via an invalid src attribute value ("?") in an HTML frame tag that is in a frameset tag with a large rows attribute. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | []
|
|
GHSA-f437-wvp3-3vmp | The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error. | []
|
|
GHSA-36fx-rf6c-vc8x | Cacti 0.8.6i, and possibly other versions, allows remote authenticated users to cause a denial of service (CPU consumption) via a large value of the (1) graph_height or (2) graph_width parameter, different vectors than CVE-2007-3112. | []
|
|
CVE-2024-11309 | TRCore DVC - Arbitrary File Read through Path Traversal | The DVC from TRCore has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. | [
"cpe:2.3:a:trcore:dvc:*:*:*:*:*:*:*:*"
]
|
GHSA-356h-vwf2-6hvf | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security. | []
|
|
GHSA-8fwv-6xr7-j4q5 | A vulnerability, which was classified as critical, has been found in UTT HiPER 840G up to 3.1.1-190328. This issue affects some unknown processing of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
|
|
CVE-2021-23880 | Improper Access Control in the ENS installer | Improper Access Control in attribute in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows authenticated local administrator user to perform an uninstallation of the anti-malware engine via the running of a specific command with the correct parameters. | [
"cpe:2.3:a:mcafee:endpoint_security:*:*:*:*:*:windows:*:*"
]
|
GHSA-vwjx-575r-p4w6 | A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | []
|
|
CVE-2007-0105 | Stack-based buffer overflow in the CSAdmin service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allows remote attackers to execute arbitrary code via a crafted HTTP GET request. | [
"cpe:2.3:a:cisco:secure_access_control_server:*:*:*:*:*:*:*:*"
]
|
|
CVE-2009-5157 | On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable. | [
"cpe:2.3:o:linksys:wag54g2_firmware:1.00.10:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wag54g2:-:*:*:*:*:*:*:*"
]
|
|
CVE-2002-2222 | isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote attackers to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence. | [
"cpe:2.3:o:freebsd:ports_collection:*:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*"
]
|
|
GHSA-rrcr-75gv-j4qm | In the Linux kernel, the following vulnerability has been resolved:HID: nintendo: fix rumble worker null pointer derefWe can dereference a null pointer trying to queue work to a destroyed
workqueue.If the device is disconnected, nintendo_hid_remove is called, in which
the rumble_queue is destroyed. Avoid using that queue to defer rumble
work once the controller state is set to JOYCON_CTLR_STATE_REMOVED.This eliminates the null pointer dereference. | []
|
|
GHSA-c6f2-hw3g-3568 | A vulnerability in Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to errors that occur when retrieving the public release key that is used for image signature verification. An attacker could exploit this vulnerability by modifying specific variables in the Serial Peripheral Interface (SPI) flash memory of an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Note: In Cisco IOS XE Software releases 16.11.1 and later, the complexity of an attack using this vulnerability is high. However, an attacker with level-15 privileges could easily downgrade the Cisco IOS XE Software on a device to a release that would lower the attack complexity. | []
|
|
CVE-2017-18345 | The Joomanager component through 2.0.0 for Joomla! has an arbitrary file download issue, resulting in exposing the credentials of the database via an index.php?option=com_joomanager&controller=details&task=download&path=configuration.php request. | [
"cpe:2.3:a:joomanager_project:joomanager:*:*:*:*:*:joomla\\!:*:*"
]
|
|
GHSA-wmh6-wh26-4mj9 | An unauthenticated could abuse a XXE vulnerability in the Smart Device Server to leak data or perform a Server-Side Request Forgery (SSRF). | []
|
|
CVE-2019-2780 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Components / Services). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
]
|
|
CVE-2006-3709 | Unspecified vulnerability in OC4J for Oracle Application Server 9.0.2.3, 9.0.3.1, and 10.1.2.0.0 has unknown impact and attack vectors, aka Oracle Vuln# AS04. | [
"cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.0:*:*:*:*:*:*:*"
]
|
|
GHSA-g94p-m365-483p | Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value. | []
|
|
GHSA-53p3-f48x-w9j5 | Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired. | []
|
|
CVE-2025-2731 | H3C Magic BE18000 HTTP POST Request getDualbandSync command injection | A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/wizard/getDualbandSync of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. | []
|
CVE-2025-3363 | HGiga iSherlock - OS Command Injection | The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. | []
|
CVE-2016-5563 | Unspecified vulnerability in the Oracle Hospitality OPERA 5 Property Services component in Oracle Hospitality Applications 5.4.0.0 through 5.4.3.0, 5.5.0.0, and 5.5.1.0 allows remote administrators to affect confidentiality, integrity, and availability via vectors related to OPERA. | [
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.1.0:*:*:*:*:*:*:*"
]
|
|
CVE-2006-3164 | SQL injection vulnerability in category.php in TPL Design tplShop 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the first_row parameter. | [
"cpe:2.3:a:tpl_design:tplshop:*:*:*:*:*:*:*:*"
]
|
|
GHSA-5w97-27q9-2x28 | A perfselecttask expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | []
|
|
CVE-2023-34423 | Survey Maker prior to 3.6.4 contains a stored cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in to the website using the product with the administrative privilege. | []
|
|
GHSA-q7pp-wcgr-pffx | Crash when processing crafted TIFF files | Disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence | []
|
CVE-2018-0877 | The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
]
|
|
GHSA-f3m6-3fcq-hc6g | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Form To JSON allows Reflected XSS. This issue affects Form To JSON: from n/a through 1.0. | []
|
|
CVE-2013-2794 | Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line. | [
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.06.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.07.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.08.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.09.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.10.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.11.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.12.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.13.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.14.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.15.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.06.0.171:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.07.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.08.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.09.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.14.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.0.369:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50.0309:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.51:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.53:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0515:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0516:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0517:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0518:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0528:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0529:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0536:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0540:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0544:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0545:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0552:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0553:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0558:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0561:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0562:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0564:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0565:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0566:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0567:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0569:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0570:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0571:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0572:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0573:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0574:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0575:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0576:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0577:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0578:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0579:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0580:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0581:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0582:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0583:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0584:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0586:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0587:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0588:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0589:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0590:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0591:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0592:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0594:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0595:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0596:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0597:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0598:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0599:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00.0616:*:*:*:*:*:*:*"
]
|
|
CVE-2024-54523 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory. | []
|
|
GHSA-q9xm-6wgc-cfhr | Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895. | []
|
|
CVE-2012-1781 | Multiple cross-site scripting (XSS) vulnerabilities in ajax/commentajax.php in SocialCMS 1.0.5 allow remote attackers to inject arbitrary web script or HTML via the (1) TREF_email_address or (2) TR_name parameters. | [
"cpe:2.3:a:socialcms:socialcms:1.0.5:*:*:*:*:*:*:*"
]
|
|
CVE-2007-5994 | PHP remote file inclusion vulnerability in check_noimage.php in Fritz Berger yet another php photo album - next generation (yappa-ng) 2.3.2 allows remote attackers to execute arbitrary PHP code via a URL in the config[path_src_include] parameter. | [
"cpe:2.3:a:yappa-ng:yappa-ng:2.3.2:*:*:*:*:*:*:*"
]
|
|
GHSA-4x9c-4g9p-35rm | It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue. | []
|
|
CVE-2017-17102 | Fiyo CMS 2.0.7 has SQL injection in /system/site.php via $_REQUEST['link']. | [
"cpe:2.3:a:fiyo:fiyo_cms:2.0.7:*:*:*:*:*:*:*"
]
|
|
GHSA-7mpx-vg3c-cmr4 | Improper Authentication in react-adal | This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic. | []
|
GHSA-wm6m-gxgr-pvq6 | Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check. | []
|
|
CVE-2019-5588 | A reflected Cross-Site-Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4 under SSL VPN web portal may allow an attacker to execute unauthorized malicious script code via the "err" parameter of the error process HTTP requests. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
]
|
|
GHSA-wq55-fhp8-6jh8 | Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromAddressNat function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | []
|
|
GHSA-xc6g-ggrc-qq4r | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`.Proof of ConceptRecommendationUpdate to version 1.11.4 or later. | []
|
GHSA-m5q9-gx2f-vvf3 | In the Linux kernel, the following vulnerability has been resolved:xen: privcmd: Switch from mutex to spinlock for irqfdsirqfd_wakeup() gets EPOLLHUP, when it is called by
eventfd_release() by way of wake_up_poll(&ctx->wqh, EPOLLHUP), which
gets called under spin_lock_irqsave(). We can't use a mutex here as it
will lead to a deadlock.Fix it by switching over to a spin lock. | []
|
|
CVE-2021-46753 | Failure to validate the length fields of the ASP
(AMD Secure Processor) sensor fusion hub headers may allow an attacker with a
malicious Uapp or ABL to map the ASP sensor fusion hub region and overwrite
data structures leading to a potential loss of confidentiality and integrity.
| [
"cpe:2.3:o:amd:ryzen_6600h_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600u_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800h_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800u_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6900hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6900hx_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6980hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6980hx_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:renoirpi-fp6_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150g_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150g_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*"
]
|
|
CVE-2016-7639 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
]
|
|
GHSA-2j6r-9vv4-6gf5 | github.com/bincyber/go-sqlcrypter vulnerable to IV collision | There is a risk of an IV collision using the awskms or aesgcm provider. NIST SP 800-38D section 8.3 states that it is unsafe to encrypt more than 2^32 plaintexts under the same key when using a random IV. The limit could easily be reached given the use case of database column encryption. Ciphertexts are likely to be persisted and stored together. IV collision could enable an attacker with access to the ciphertexts to decrypt all messages encrypted with the affected key.The aesgcm provider cannot be fixed without a breaking change, so users should not encrypt more than 2^32 values with any key. The awskms package can be fixed without a breaking change by switching to a counter-based IV. | []
|
CVE-2018-18738 | An XSS issue was discovered in SEMCMS 3.4 via the admin/SEMCMS_Categories.php?pid=1&lgid=1 category_key parameter. | [
"cpe:2.3:a:sem-cms:semcms:3.4:*:*:*:*:*:*:*"
]
|
|
GHSA-5rmf-gfqh-5993 | A vulnerability in the media engine component of Cisco Webex Meetings Client for Windows, Cisco Webex Meetings Desktop App for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to gain access to sensitive information. The vulnerability is due to unsafe logging of authentication requests by the affected software. An attacker could exploit this vulnerability by reading log files that are stored in the application directory. A successful exploit could allow the attacker to gain access to sensitive information, which could be used in further attacks. | []
|
|
CVE-2009-2274 | The Huawei D100 allows remote attackers to obtain sensitive information via a direct request to (1) lan_status_adv.asp, (2) wlan_basic_cfg.asp, or (3) lancfg.asp in en/, related to use of JavaScript to protect against reading file contents. | [
"cpe:2.3:h:huawei:d100:-:*:*:*:*:*:*:*"
]
|
|
GHSA-56mr-g6c3-5x8x | Multiple stack-based buffer overflows in Ipropsapi in Panasonic Security API (PS-API) ActiveX SDK before 8.10.18 allow remote attackers to execute arbitrary code via a long string in the (1) FilePassword property or to the (2) GetStringInfo method. | []
|
|
CVE-2018-18787 | An issue was discovered in zzcms 8.3. SQL Injection exists in zs/zs.php via a pxzs cookie. | [
"cpe:2.3:a:zzcms:zzcms:8.3:*:*:*:*:*:*:*"
]
|
|
CVE-2017-6268 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a value passed from a user to the driver is not correctly validated and used as the index to an array which may lead to denial of service or possible escalation of privileges. | [
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-ch56-5g7c-36xc | An issue in NETIS SYSTEMS WF2409Ev4 v.1.0.1.705 allows a remote attacker to execute arbitrary code and obtain sensitive information via the password parameter in the /etc/shadow.sample component. | []
|
|
GHSA-6j9p-gpj2-ch2c | The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete. | []
|
|
GHSA-f353-6hqm-57r9 | Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability | []
|
|
CVE-2017-1000243 | Jenkins Favorite Plugin 2.1.4 and older does not perform permission checks when changing favorite status, allowing any user to set any other user's favorites | [
"cpe:2.3:a:jenkins:favorite_plugin:*:*:*:*:*:jenkins:*:*"
]
|
|
CVE-2019-5187 | An exploitable out-of-bounds write vulnerability exists in the TIFreadstripdata function of the igcore19d.dll library of Accusoft ImageGear 19.5.0. A specially crafted TIFF file file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability. | [
"cpe:2.3:a:accusoft:imagegear:19.5.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-7608 | An authenticated user can access the restricted files from NX, EX, FX, AX, IVX and CMS using path traversal. | []
|
|
CVE-2010-3526 | Unspecified vulnerability in the PeopleSoft Enterprise SCM - PO component in Oracle PeopleSoft and JDEdwards Suite 8.9 Bundle #38, 9.0 Bundle #31, and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. | [
"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:9.0:bundle31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:9.1:bundle6:*:*:*:*:*:*"
]
|
|
CVE-2024-4700 | WP Table Builder – WordPress Table Plugin <= 1.4.14 - Authenticated (Contributor+) Stored Cross-Site Scripting | The WP Table Builder – WordPress Table Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the button element in all versions up to, and including, 1.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure WP Table Builder can be extended to contributors. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.