id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-cp3x-qppm-9hf8 | Vulnerability in the Oracle Tuxedo component of Oracle Fusion Middleware (subcomponent: Core). Supported versions that are affected are 11.1.1, 12.1.1, 12.1.3 and 12.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via Jolt to compromise Oracle Tuxedo. While the vulnerability is in Oracle Tuxedo, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Tuxedo accessible data as well as unauthorized access to critical data or complete access to all Oracle Tuxedo accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Tuxedo. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L). | [] |
|
CVE-2016-6625 | An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.3:*:*:*:*:*:*:*"
] |
|
CVE-1999-0205 | Denial of service in Sendmail 8.6.11 and 8.6.12. | [
"cpe:2.3:a:eric_allman:sendmail:8.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.6.12:*:*:*:*:*:*:*"
] |
|
GHSA-2348-ccqj-8p27 | Jenkins RQM Plugin allows enumerating credentials IDs due to missing permission check | Jenkins RQM Plugin 2.8 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. | [] |
GHSA-r4v7-5jww-mc29 | SQL injection vulnerability in ESRI ArcGIS 10.1 allows remote authenticated users to execute arbitrary SQL commands via the where parameter to a query URI for a REST service. | [] |
|
CVE-2024-1310 | WooCommerce < 8.6 - Contributor+ Private/Draft Products Access | The WooCommerce WordPress plugin before 8.6 does not prevent users with at least the contributor role from leaking products they shouldn't have access to. (e.g. private, draft and trashed products) | [] |
CVE-2022-22034 | Windows Graphics Component Elevation of Privilege Vulnerability | Windows Graphics Component Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-2cw2-wqm2-wwp4 | The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350. | [] |
|
GHSA-38wc-99fv-jfwv | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this vulnerability is the function cgi_get_cooliris of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument path leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. | [] |
|
GHSA-r87f-26v2-9p82 | On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a directory traversal vulnerability exists in iControl SOAP that allows an authenticated attacker with at least guest role privileges to read wsdl files in the BIG-IP file system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | [] |
|
CVE-2022-49345 | net: xfrm: unexport __init-annotated xfrm4_protocol_init() | In the Linux kernel, the following vulnerability has been resolved:
net: xfrm: unexport __init-annotated xfrm4_protocol_init()
EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.
modpost used to detect it, but it has been broken for a decade.
Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.
There are two ways to fix it:
- Remove __init
- Remove EXPORT_SYMBOL
I chose the latter for this case because the only in-tree call-site,
net/ipv4/xfrm4_policy.c is never compiled as modular.
(CONFIG_XFRM is boolean) | [] |
CVE-2007-4035 | Guidance Software EnCase does not properly handle (1) certain malformed MBR partition tables with many entries, which allows remote attackers to prevent logical collection of a disk image; (2) NTFS filesystems with directory loops, which allows remote attackers to prevent examination of certain directory contents; and (3) certain other malformed NTFS filesystems, which allows remote attackers to prevent examination of corrupted records. NOTE: the vendor disputes the significance of these issues, because physical collection can be used instead, because the vendor believes that relevant attackers typically do not corrupt an MBR or a filesystem, and because detection of a loop is valuable on its own | [
"cpe:2.3:a:guidance_software:encase:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-43977 | WordPress The Plus Addons for Elementor plugin <= 5.6.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in POSIMYTH The Plus Addons for Elementor Page Builder Lite allows Stored XSS.This issue affects The Plus Addons for Elementor Page Builder Lite: from n/a through 5.6.2. | [
"cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*"
] |
CVE-2019-8200 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-20919 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). | [
"cpe:2.3:a:oracle:graalvm:20.3.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:22.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update391:*:*:-:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update391:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update391:*:*:-:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update391:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:21.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-gcr6-mhvm-c5mf | daemon/worker.c in Unbound 1.x before 1.4.10, when debugging functionality and the interface-automatic option are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DNS request that triggers improper error handling. | [] |
|
GHSA-6gcw-7qx9-8vhw | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. | [] |
|
GHSA-2cc5-429x-p387 | Zenario Cross Site Scripting in the Image library | Zenario 9.7.61188 is vulnerable to Cross Site Scripting (XSS) in the Image library via the "Organizer tags" field. | [] |
GHSA-prpj-6mvr-8mjf | Dell Container Storage Modules 1.2 contains an OS Command Injection in goiscsi and gobrick libraries. A remote unauthenticated attacker could exploit this vulnerability leading to modification of intended OS command execution. | [] |
|
GHSA-vq7q-vrrq-cr5f | imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command. | [] |
|
GHSA-279x-vjpx-pq4v | Verifone Pinpad Payment Terminals allow undocumented physical access to the system via an SBI bootloader memory write operation. | [] |
|
GHSA-8qp4-g23m-7ww9 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SEO Squirrly SEO Plugin by Squirrly SEO allows SQL Injection.This issue affects SEO Plugin by Squirrly SEO: from n/a through 12.4.03. | [] |
|
CVE-2022-37804 | Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the time parameter in the function saveParentControlInfo. | [
"cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*"
] |
|
GHSA-rmr4-hpcj-ppcf | Out-of-bounds Read vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, MELSOFT Navigator all versions and EZSocket all versions allows an attacker to cause a DoS condition in the software by getting a user to open malicious project file specially crafted by an attacker. | [] |
|
CVE-2011-3110 | The PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*"
] |
|
CVE-2021-40925 | Cross-site scripting (XSS) vulnerability in dompdf/dompdf/www/demo.php infaveo-helpdesk v1.11.0 and below allow remote attackers to inject arbitrary web script or HTML via the $_SERVER["PHP_SELF"] parameter. | [
"cpe:2.3:a:faveohelpdesk:faveo:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-11809 | ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-17460 | Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-j69x-v3vw-7m6g | Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.1) uses default (1) usernames and (2) passwords for (a) the administrator and (b) web management, which makes it easier for remote attackers to perform configuration changes or obtain operating-system access. | [] |
|
GHSA-g65q-gwjf-668c | PHP Scripts Mall Basic B2B Script 2.0.9 has Cross-Site Request Forgery (CSRF) via the Edit profile feature. | [] |
|
CVE-2018-19571 | GitLab CE/EE, versions 8.18 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an SSRF vulnerability in webhooks. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2021-41005 | A remote vulnerability was discovered in Aruba Instant On 1930 Switch Series version(s): Firmware below v1.0.7.0. | [
"cpe:2.3:o:hpe:aruba_instant_on_1930_8g_2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_8g_2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:aruba_instant_on_1930_8g_class4_poe_2sfp_124w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_8g_class4_poe_2sfp_124w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:aruba_instant_on_1930_48g_class4_poe_4sfp\\/sfp\\+_370w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_48g_class4_poe_4sfp\\/sfp\\+_370w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:aruba_instant_on_1930_48g_4sfp\\/sfp\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_48g_4sfp\\/sfp\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_370w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_370w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_195w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_195w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:aruba_instant_on_1930_24g_4sfp\\/sfp\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_instant_on_1930_24g_4sfp\\/sfp\\+:-:*:*:*:*:*:*:*"
] |
|
GHSA-4x5c-2c3m-624h | XML external entity (XXE) vulnerability in the GlobalProtect internal and external gateway interface in Palo Alto Networks PAN-OS before 6.1.18, 7.0.x before 7.0.17, 7.1.x before 7.1.12, and 8.0.x before 8.0.3 allows remote attackers to obtain sensitive information, cause a denial of service, or conduct server-side request forgery (SSRF) attacks via unspecified vectors. | [] |
|
CVE-2020-3478 | Cisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability | A vulnerability in the REST API of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to overwrite certain files that should be restricted on an affected device. The vulnerability is due to insufficient authorization enforcement on an affected system. An attacker could exploit this vulnerability by uploading a file using the REST API. A successful exploit could allow an attacker to overwrite and upload files, which could degrade the functionality of the affected system. | [
"cpe:2.3:a:cisco:enterprise_network_function_virtualization_infrastructure:*:*:*:*:*:*:*:*"
] |
GHSA-mrq9-3vcx-54jj | Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Extensibility Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L). | [] |
|
GHSA-jqf9-p22x-fqr9 | Multiple PHP remote file inclusion vulnerabilities in Vtiger CRM 4.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the calpath parameter to (1) modules/Calendar/admin/update.php, (2) modules/Calendar/admin/scheme.php, or (3) modules/Calendar/calendar.php. | [] |
|
GHSA-qww3-wjff-2gj7 | Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors. | [] |
|
CVE-2008-1485 | Cross-site scripting (XSS) vulnerability in PunBB 1.2.16 and earlier allows remote attackers to inject arbitrary web script or HTML via the get_host parameter to moderate.php. | [
"cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:punbb:punbb:1.2.16:*:*:*:*:*:*:*"
] |
|
GHSA-q7r2-fq2f-675v | An issue was discovered in Xpdf 4.01.01. There is an FPE in the function ImageStream::ImageStream at Stream.cc for nComps. | [] |
|
GHSA-vfxm-h93r-r7qp | Unspecified vulnerability in the Oracle CRM Wireless component in Oracle E-Business Suite 12.1.3 allows remote attackers to affect confidentiality and integrity via vectors related to Call Phone Number Page. | [] |
|
CVE-2019-11513 | The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action. | [
"cpe:2.3:a:cmsmadesimple:cms_made_simple:*:*:*:*:*:*:*:*"
] |
|
GHSA-2fhw-h5f5-45gf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in noonnoo Gravel allows Reflected XSS.This issue affects Gravel: from n/a through 1.6. | [] |
|
CVE-2024-13108 | D-Link DIR-816 A2 form2NetSniper.cgi access control | A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been declared as critical. This vulnerability affects unknown code of the file /goform/form2NetSniper.cgi. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2007-0711 | Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating systems, allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP video file. | [
"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-31131 | Arbitrary File Write when Extracting Tarballs in greenplum-db | Greenplum Database (GPDB) is an open source data warehouse based on PostgreSQL. In versions prior to 6.22.3 Greenplum Database used an unsafe methods to extract tar files within GPPKGs. greenplum-db is vulnerable to path traversal leading to arbitrary file writes. An attacker can use this vulnerability to overwrite data or system files potentially leading to crash or malfunction of the system. Any files which are accessible to the running process are at risk. All users are requested to upgrade to Greenplum Database version 6.23.2 or higher. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:vmware:greenplum_database:*:*:*:*:*:*:*:*"
] |
GHSA-f47g-ccch-6353 | Missing Authorization vulnerability in Martin Gibson IdeaPush allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects IdeaPush: from n/a through n/a. | [] |
|
GHSA-3qg7-2p3j-xrqp | Product: AndroidVersions: Android SoCAndroid ID: A-278156680 | [] |
|
CVE-2017-15654 | Highly predictable session tokens in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allow gaining administrative router access. | [
"cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:*"
] |
|
GHSA-hjq7-xwrq-jpwv | FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c. | [] |
|
CVE-2018-1602 | IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 143792. | [
"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-4747 | Mail in Apple iOS before 10 mishandles certificates, which makes it easier for man-in-the-middle attackers to discover mail credentials via unspecified vectors. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-qqgp-67mp-f5w9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood RSS Feed Widget allows Stored XSS.This issue affects RSS Feed Widget: from n/a through 2.9.7. | [] |
|
GHSA-p389-vcjc-h255 | Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | [] |
|
CVE-2020-3915 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. A malicious application may be able to overwrite arbitrary files. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-v3vp-qqmj-ggrj | Quick Heal Total Security before 19.0 allows attackers with local admin rights to obtain access to files in the File Vault via a brute-force attack on the password. | [] |
|
CVE-2022-25020 | A cross-site scripting (XSS) vulnerability in Pluxml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the thumbnail path of a blog post. | [
"cpe:2.3:a:pluxml:pluxml:5.8.7:*:*:*:*:*:*:*"
] |
|
GHSA-v9m5-9vg5-h8w2 | Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks. | [] |
|
CVE-2006-6903 | Unspecified vulnerability in the Toshiba Bluetooth stack allows remote attackers to gain administrative access (aka Remote Root) via unspecified vectors. | [
"cpe:2.3:a:toshiba:bluetooth:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-41503 | DCS-5000L v1.05 and DCS-932L v2.17 and older are affecged by Incorrect Acess Control. The use of the basic authentication for the devices command interface allows attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:o:d-link:dcs-5000l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dcs-932l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-932l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dcs-5000l_firmware:1.05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5000l:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-41372 | Power BI Report Server Spoofing Vulnerability | A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power BI Report Server Template file (pbix) containing HTML files is uploaded to the server and HTML files are accessed directly by the victim.
Combining these 2 vulnerabilities together, an attacker is able to upload malicious Power BI templates files to the server using the victim's session and run scripts in the security context of the user and perform privilege escalation in case the victim has admin privileges when the victim access one of the HTML files present in the malicious Power BI template uploaded.
The security update addresses the vulnerability by helping to ensure that Power BI Report Server properly sanitize file uploads.
| [
"cpe:2.3:a:microsoft:power_bi_report_server:15.0.1107.165:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:power_bi_report_server:*:*:*:*:*:*:*:*"
] |
GHSA-5wc4-w63v-97c3 | XXE vulnerability in Jenkins Nested View Plugin | Jenkins Nested View Plugin 1.20 and earlier does not configure its XML transformer to prevent XML external entity (XXE) attacks.This allows attackers able to configure views to have Jenkins parse a crafted view XML definition that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.Jenkins Nested View Plugin 1.21 disables external entity resolution for its XML transformer. | [] |
CVE-2014-8144 | Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors. | [
"cpe:2.3:a:doorkeeper_project:doorkeeper:*:*:*:*:*:ruby:*:*"
] |
|
CVE-2019-1438 | An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1407, CVE-2019-1433, CVE-2019-1435, CVE-2019-1437. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-739j-9mp5-mmf8 | LearnDash v6.7.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the ld-comment-body class. | [] |
|
CVE-2024-40481 | A Stored Cross Site Scripting (XSS) vulnerability was found in "/admin/view-enquiry.php" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the Contact Us page "message" parameter. | [
"cpe:2.3:a:phpgurukul:old_age_home_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-5243 | The Symantec Encryption Management Server (SEMS) product, prior to version 3.4.2 MP1, may be susceptible to a denial of service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network. | [
"cpe:2.3:a:symantec:encryption_management_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-cc8m-4xfj-4h3j | Windows DNS Spoofing Vulnerability | [] |
|
GHSA-wj3v-j872-6xqx | Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow. | [] |
|
GHSA-4323-f82v-f6jr | Magento Open Source Cross-Site Request Forgery (CSRF) vulnerability | Magento Open Source versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction. | [] |
CVE-2017-9949 | The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02. | [
"cpe:2.3:a:radare:radare2:1.5.0:*:*:*:*:*:*:*"
] |
|
GHSA-qjvc-3w5m-f5pj | Directory traversal vulnerability in Endymion MailMan before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) and a null character in the ALTERNATE_TEMPLATES parameter for various mmstdo*.cgi programs. | [] |
|
CVE-2013-3247 | Heap-based buffer overflow in xnview.exe in XnView before 2.03 allows remote attackers to execute arbitrary code via a crafted RLE compressed layer in an XCF file. | [
"cpe:2.3:a:xnview:xnview:*:*:*:*:*:*:*:*"
] |
|
GHSA-4h9h-37ch-jq2m | A Cross-Site Scripting (XSS) vulnerability exists in the ITMS workflow process manager console in Symantec IT Management Suite 8.0. | [] |
|
GHSA-qh9v-58cc-xcxm | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qamar Sheeraz, Nasir Ahmad, GenialSouls Mega Addons For Elementor allows Stored XSS.This issue affects Mega Addons For Elementor: from n/a through 1.9. | [] |
|
GHSA-58jc-qqg8-qv38 | The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead of a keyring key, which causes an invalid dereference in the __keyring_search_one function. | [] |
|
CVE-2017-9946 | A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. An attacker with network access to the integrated web server (80/tcp and 443/tcp) could bypass the authentication and download sensitive information from the device. | [
"cpe:2.3:o:siemens:apogee_pxc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc_modular:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_compact_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_modular_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc_modular:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-3181 | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect availability via unknown vectors related to Security. | [
"cpe:2.3:a:oracle:peoplesoft_products:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*"
] |
|
CVE-2008-10002 | cfire24 ajaxlife cross site scripting | A vulnerability has been found in cfire24 ajaxlife up to 0.3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.3.3 is able to address this issue. The patch is identified as 9fb53b67312fe3f4336e01c1e3e1bedb4be0c1c8. It is recommended to upgrade the affected component. VDB-222286 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:ajaxlife_project:ajaxlife:*:*:*:*:*:*:*:*"
] |
CVE-2024-55626 | Suricata oversized bpf file can lead to buffer overflow | Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. The issue has been addressed in Suricata 7.0.8. | [] |
CVE-2024-1512 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-22666 | Integer Overflow or Wraparound in Audio | Memory Corruption in Audio while playing amrwbplus clips with modified content. | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] |
CVE-2020-36527 | Server Status HTTP Status/SMTP Status cross site scripting | A vulnerability, which was classified as problematic, has been found in Server Status. This issue affects some unknown processing of the component HTTP Status/SMTP Status. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:aptis-solutions:server_status:1.2.1:*:*:*:*:confluence:*:*"
] |
CVE-2023-36047 | Windows Authentication Elevation of Privilege Vulnerability | Windows Authentication Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2024-5006 | Boostify Header Footer Builder for Elementor <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via size Parameter | The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘size’ parameter in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:woostify:boostify_header_footer_builder_for_elementor:*:*:*:*:*:wordpress:*:*"
] |
CVE-2014-2296 | XML external entity (XXE) vulnerability in java/org/jasig/cas/util/SamlUtils.java in Jasig CAS server before 3.4.12.1 and 3.5.x before 3.5.2.1, when Google Accounts Integration is enabled, allows remote unauthenticated users to bypass authentication via crafted XML data. | [
"cpe:2.3:a:apereo:cas_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-26070 | Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1. | [
"cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-8g5p-g58h-hr3v | CA Unified Infrastructure Management 20.1 and earlier contains a vulnerability in the robot (controller) component that allows local attackers to elevate privileges. | [] |
|
GHSA-pgw8-84wx-gr5w | Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request. | [] |
|
GHSA-g5wq-3r27-v2x7 | In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2018-6387 | iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a hardcoded password of admin for the admin account, a hardcoded password of support for the support account, and a hardcoded password of user for the user account. | [
"cpe:2.3:o:iball:ib-wra150n_firmware:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:iball:ib-wra150n:-:*:*:*:*:*:*:*"
] |
|
GHSA-3j55-q2r8-vc2j | csLiveSupport.cgi in CGIScript.net csLiveSupport allows remote attackers to execute arbitrary Perl code via the setup parameter, which is processed by the Perl eval function. | [] |
|
GHSA-hg35-vqp3-fv39 | ZendFramework potential Cross-site Scripting vectors due to inconsistent encodings | A number of classes, primarily within the `Zend_Form`, `Zend_Filter`, `Zend_Form`, `Zend_Log` and `Zend_View components`, contained character encoding inconsistencies whereby calls to the `htmlspecialchars()` and htmlentities() functions used undefined or hard coded charset parameters. In many of these cases developers were unable to set a character encoding of their choice. These inconsistencies could, in specific circumstances, allow certain multibyte representations of special HTML characters pass through unescaped leaving applications potentially vulnerable to cross-site scripting (XSS) exploits. Such exploits would only be possible if a developer used a non-typical character encoding (such as UTF-7), allowed users to define the character encoding, or served HTML documents without a valid character set defined. | [] |
GHSA-9w67-5jpv-rm8v | Atlassian JIRA Software 7.0.3, JIRA Core 7.0.3, and the bundled JIRA Service Desk 3.0.3 installer attaches the wrong image to e-mail notifications when a user views an issue with inline wiki markup referencing an image attachment, which might allow remote attackers to obtain sensitive information by updating a different issue that includes wiki markup for an external image reference. | [] |
|
GHSA-pp98-436h-9qgg | HCL Workload Automation 9.4, 9.5, and 10.1 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. | [] |
|
CVE-2016-4870 | Cross-site scripting vulnerability in Cybozu Office 9.0.0 to 10.4.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the Schedule function. | [
"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.4.0:*:*:*:*:*:*:*"
] |
|
GHSA-w8r2-7mw7-vh56 | A RADIUS Secret Disclosure vulnerability in the web network management interface of Cisco Prime Optical for Service Providers could allow an authenticated, remote attacker to disclose sensitive information in the configuration generated for a device. The attacker must have valid credentials for the device. More Information: CSCvc65257. Known Affected Releases: 10.6(0.1). | [] |
|
GHSA-g837-68p6-22xj | The Runtastic Mountain Bike (aka com.runtastic.android.mountainbike.lite) application 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-89q9-wwr5-f2mf | Unrestricted file upload vulnerability in toendaCMS before 0.6.2 Stable allows remote authenticated administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in data/images/albums. | [] |
|
CVE-2015-7793 | Corega CG-WLBARAGM devices provide an open proxy service, which allows remote attackers to trigger outbound network traffic via unspecified vectors. | [
"cpe:2.3:o:corega:cg-wlbaragm_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-4342 | MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.