id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-m54q-hvr6-96wf | In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1. Juniper Networks Junos OS Evolved 20.1 versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO. | [] |
|
GHSA-gc4p-7qxx-hhrw | Reuse of a static AES key and initialization vector for encrypted traffic to the 'ate' management service of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt, replay, and/or forge traffic to the service. | [] |
|
GHSA-64rp-5x3g-4984 | Apple MacOS X 10.0 and 10.1 allow a local user to read and write to a user's desktop folder via insecure default permissions for the Desktop when it is created in some languages. | [] |
|
GHSA-hmf8-53x4-w3jj | A privilege escalation vulnerability exists within Global RADAR BSA Radar 1.6.7234.24750 and earlier that allows an authenticated, low-privileged user to escalate their privileges to administrator rights (i.e., the BankAdmin role) via modified SaveUser data. | [] |
|
CVE-2019-15446 | The Samsung S7 Android device with a build fingerprint of samsung/heroltexx/herolte:8.0.0/R16NW/G930FXXU3ESAC:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [
"cpe:2.3:o:samsung:galaxy_s7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-37038 | A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Uplink NAS Transport` packet missing an expected `MME_UE_S1AP_ID` field. | [] |
|
CVE-2006-1988 | The WebTextRenderer(WebInternal) _CG_drawRun:style:geometry: function in Apple Safari 2.0.3 allows remote attackers to cause a denial of service (application crash) via an HTML LI tag with a large VALUE attribute (list item number), which triggers a null dereference in QPainter::drawText, probably due to a failed memory allocation that uses the VALUE. | [
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-hvvp-q39h-2h56 | Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Media security." | [] |
|
CVE-2015-0252 | internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data. | [
"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:xerces-c\\+\\+:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-21466 | SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service. | [
"cpe:2.3:a:sap:business_warehouse:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:711:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:740:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:business_warehouse:782:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:bw\\/4hana:100:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:bw\\/4hana:200:*:*:*:*:*:*:*"
] |
|
GHSA-m57v-fhqq-h74x | Information Disclosure in data Modem while parsing an FMTP line in an SDP message. | [] |
|
CVE-2007-2158 | PHP remote file inclusion vulnerability in index.php in jGallery 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the G_JGALL[inc_path] parameter. | [
"cpe:2.3:a:kooijman-design:jgallery:1.3:*:*:*:*:*:*:*"
] |
|
GHSA-45jp-c6ff-rg7j | Adobe Creative Cloud Desktop Application (installer) version 2.4 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2015-9072 | In all Qualcomm products with Android releases from CAF using the Linux kernel, an untrusted pointer dereference can occur in a TrustZone syscall. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-2w83-6jxw-jfx8 | The wp Time Machine plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.0. This is due to missing or incorrect nonce validation on the 'wpTimeMachineCore.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-fgjg-7995-2xw4 | media/libmediaplayerservice/nuplayer/GenericSource.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate certain track data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28799341. | [] |
|
GHSA-jhc6-x647-xmhf | An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup="false" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API. | [] |
|
CVE-2015-6549 | Cross-site scripting (XSS) vulnerability in an application console in the server in Symantec NetBackup OpsCenter before 7.7.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:symantec:netbackup_opscenter:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-2358 | Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Rest interfaces for Access Mgr). The supported version that is affected is 11.1.2.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTPS to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Access Manager accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-8085 | Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. | [
"cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-0805 | Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function. | [
"cpe:2.3:a:sqlalchemy:sqlalchemy:*:b3:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.7.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:sqlalchemy:sqlalchemy:0.7.0:b2:*:*:*:*:*:*"
] |
|
GHSA-rjw7-cp46-vrpf | Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions. | [] |
|
GHSA-5hv3-87wh-h8h8 | Buffer overflow in Cocoa spell checking in AppKit in Apple Mac OS X 10.5.8 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document. | [] |
|
CVE-2006-6385 | Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers. | [
"cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pro_1000_pcie_adapters:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pro_10gbe_adapters:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-15802 | Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less. | [
"cpe:2.3:a:bluetooth:bluetooth_core_specification:*:*:*:*:*:*:*:*"
] |
|
GHSA-4vg4-f6g7-84r7 | The Binary MLM Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page’ parameter in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
GHSA-v64m-5p9c-484j | An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | [] |
|
CVE-2023-48548 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
CVE-2012-6644 | Multiple cross-site scripting (XSS) vulnerabilities in ClipBucket 2.6 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to channels.php, (2) collections.php, (3) groups.php, or (4) videos.php; (5) query parameter to search_result.php; or (6) type parameter to view_collection.php or (7) view_item.php. | [
"cpe:2.3:a:clip-bucket:clipbucket:2.6:*:*:*:*:*:*:*"
] |
|
GHSA-h7fr-j2jh-7mww | NSD before 4.1.11 allows remote DNS master servers to cause a denial of service (/tmp disk consumption and slave server crash) via a zone transfer with unlimited data. | [] |
|
CVE-2013-5748 | Cross-site request forgery (CSRF) vulnerability in management/prioritize_planning.php in SimpleRisk before 20130916-001 allows remote attackers to hijack the authentication of users for requests that add projects via an add_project action. | [
"cpe:2.3:a:simplerisk:simplerisk:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-15441 | The Samsung on7xeltelgt Android device with a build fingerprint of samsung/on7xeltelgt/on7xeltelgt:8.1.0/M1AJQ/G610LKLU2CSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [
"cpe:2.3:o:samsung:on_7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:on_7:-:*:*:*:*:*:*:*"
] |
|
GHSA-m373-j4rh-vrjp | SQL injection vulnerability in lire-avis.php in ProNews 1.5 allows remote attackers to execute arbitrary SQL commands via the aa parameter. | [] |
|
GHSA-wqhh-vh2p-v74x | A use after free in cleanup_index in index.c in Halibut 1.2 allows an attacker to cause a segmentation fault or possibly have other unspecified impact via a crafted text document. | [] |
|
GHSA-mh6w-83mx-cmc6 | Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface on the central phone server for the Snom 320 SIP Phone allow remote attackers to perform actions as the phone user, as demonstrated by inserting an address-book entry containing an XSS sequence. | [] |
|
CVE-2023-25514 | NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure. | [
"cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-q7cm-jv99-g2cv | Multiple cross-site scripting (XSS) vulnerabilities in EMC RSA Adaptive Authentication On-Premise (AAOP) before 7.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2024-13308 | Browser Back Button - Moderately critical - Cross site scripting - SA-CONTRIB-2024-072 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Browser Back Button allows Cross-Site Scripting (XSS).This issue affects Browser Back Button: from 1.0.0 before 2.0.2. | [] |
CVE-2018-11647 | index.js in oauth2orize-fprm before 0.2.1 has XSS via a crafted URL. | [
"cpe:2.3:a:oauth2orize-fprm_project:oauth2orize-fprm:*:*:*:*:*:*:*:*"
] |
|
GHSA-vpv3-rfqc-vqmp | Coship RT3052 4.0.0.48 devices allow XSS via a crafted SSID field on the "Wireless Setting - Basic" screen. | [] |
|
CVE-2007-0550 | Cross-site scripting (XSS) vulnerability in search.php in 212cafeBoard 0.08 Beta allows remote attackers to inject arbitrary web script or HTML via keyword parameter. | [
"cpe:2.3:a:212cafe:212cafeboard:0.08_beta:*:*:*:*:*:*:*"
] |
|
CVE-2012-3376 | DataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to blocks to which they only have read access, and have other unspecified impacts. | [
"cpe:2.3:a:apache:hadoop:2.0.0:alpha:*:*:*:*:*:*"
] |
|
GHSA-8c63-c298-4546 | libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function. | [] |
|
GHSA-xp9f-jwgv-v2wj | In ss_AnalyzeOssReturnResUssdArgIe of ss_OssAsnManagement.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2017-5522 | Stack-based buffer overflow in MapServer before 6.0.6, 6.2.x before 6.2.4, 6.4.x before 6.4.5, and 7.0.x before 7.0.4 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving WFS get feature requests. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:7.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:7.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:7.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-w7pm-cc4v-f3g8 | Deserialization of Untrusted Data in Liferay Portal | Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). | [] |
CVE-2017-7646 | SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to browse the server's filesystem and read the contents of arbitrary files contained within. | [
"cpe:2.3:a:solarwinds:log_\\&_event_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-54344 | WordPress WP Quick Shop plugin <= 1.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood WP Quick Shop allows Reflected XSS.This issue affects WP Quick Shop: from n/a through 1.3.1. | [] |
CVE-2014-3125 | Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors. | [
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"
] |
|
CVE-2020-17999 | Cross Site Scripting (XSS) in MiniCMS v1.10 allows remote attackers to execute arbitrary code by injecting commands via a crafted HTTP request to the component "/mc-admin/post-edit.php". | [
"cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*"
] |
|
GHSA-hcv2-rj94-5cj5 | Integer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors. | [] |
|
CVE-2021-21000 | WAGO: PFC200 Denial of Service due to the number of connections to the runtime | On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime. | [
"cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*"
] |
CVE-2010-3183 | The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*"
] |
|
CVE-2025-22217 | Avi Load Balancer contains an unauthenticated blind SQL Injection vulnerability which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.
A malicious user with network access may be able to use specially crafted SQL queries to gain database access. | [] |
|
GHSA-xf4j-p5gp-h24h | An issue was discovered in Pivotal Greenplum before 4.3.10.0. Creation of external tables using GPHDFS protocol has a vulnerability whereby arbitrary commands can be injected into the system. In order to exploit this vulnerability the user must have superuser 'gpadmin' access to the system or have been granted GPHDFS protocol permissions in order to create a GPHDFS external table. | [] |
|
CVE-2023-30543 | `chainId` may be outdated if user changes chains as part of connection in @web3-react | @web3-react is a framework for building Ethereum Apps . In affected versions the `chainId` may be outdated if the user changes chains as part of the connection flow. This means that the value of `chainId` returned by `useWeb3React()` may be incorrect. In an application, this means that any data derived from `chainId` could be incorrect. For example, if a swapping application derives a wrapped token contract address from the `chainId` *and* a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping. This issue has been addressed in PR #749 and is available in updated npm artifacts. There are no known workarounds for this issue. Users are advised to upgrade.
| [
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:7.0.0:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:7.0.1:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:7.0.2:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.22:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.23:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.24:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.25:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.26:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.27:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.28:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.29:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.30:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.31:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.32:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.33:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_coinbase-wallet:8.0.34:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:7.0.0:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:7.0.1:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:7.0.2:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.0:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.1:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.2:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.3:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.4:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.5:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.6:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.7:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.8:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.9:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.10:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.11:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.12:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.13:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.14:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.15:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.16:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.17:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.18:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.19:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.20:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.21:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.22:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.23:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.24:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.25:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_eip1193:8.0.26:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.0:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.1:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.2:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.3:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.4:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.5:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.6:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.7:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.8:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.9:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.10:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.11:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.12:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.13:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.14:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.15:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.16:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.17:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.18:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.19:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.20:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.21:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.22:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.23:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.24:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.25:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.26:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.27:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.28:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_metamask:8.0.29:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:7.0.0:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:7.0.1:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:7.0.2:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.0:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.1:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.2:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.3:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.4:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.5:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.6:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.7:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.8:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.9:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.10:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.11:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.12:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.13:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.14:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.15:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.16:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.17:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.18:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.19:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.20:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.21:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.22:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.23:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.24:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.25:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.26:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.27:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.28:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.29:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.30:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.31:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.32:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.33:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.34:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.35:beta0:*:*:*:node.js:*:*",
"cpe:2.3:a:uniswap:web3-react_walletconnect:8.0.36:beta0:*:*:*:node.js:*:*"
] |
CVE-2013-3412 | SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuh81766. | [
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:9.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:9.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:9.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:9.1.1\\(a\\):*:*:*:*:*:*:*"
] |
|
GHSA-8484-cmv2-p86m | Session hijack vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allows remote attackers to steal any active admin session by sending cgi_logout and asusrouter-Windows-IFTTT-1.0 in certain HTTP headers. | [] |
|
GHSA-p9gx-xp2f-77w2 | Cross-site scripting (XSS) vulnerability in the WP Favorite Posts plugin before 1.6.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2008-2534 | Directory traversal vulnerability in admin/admin_frame.php in Phoenix View CMS Pre Alpha2 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ltarget parameter. | [
"cpe:2.3:a:fkrauthan:phoenix_view_cms:2-pre-alpha:*:*:*:*:*:*:*"
] |
|
GHSA-8m9p-3926-gffr | wger Workout Manager Cross-site Scripting vulnerability | Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the `license_author `field in the add-ingredient function in the `templates/ingredients/view.html`, `models/ingredients.py`, and `views/ingredients.py` components. | [] |
GHSA-rmwh-hpr4-xw72 | Unspecified vulnerability in the Solaris Auditing subsystem in Sun Solaris 9 and 10 and OpenSolaris before snv_121, when extended file attributes are used, allows local users to cause a denial of service (panic) via vectors related to fad_aupath structure members. | [] |
|
GHSA-vwxj-6m5m-rrvh | The REST Plugin in Apache Struts is using an outdated XStream library | The REST Plugin in Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload. | [] |
GHSA-8fg6-84xm-jg65 | Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870. | [] |
|
CVE-2021-33542 | Phoenix Contact: Automation Worx Software Suite affected by Remote Code Execution (RCE) vulnerability | Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected. | [
"cpe:2.3:a:phoenixcontact:config\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:pc_worx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:pc_worx_express:*:*:*:*:*:*:*:*"
] |
GHSA-mg55-44g4-j8w3 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpshopee Awesome Logos allows Reflected XSS. This issue affects Awesome Logos: from n/a through 1.2. | [] |
|
GHSA-5vjr-66w2-fxv8 | The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls. | [] |
|
GHSA-qj8w-rv5x-2v9h | Duplicate Advisory: Starlette vulnerable to directory traversal | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-v5gw-mw7f-84px. This link is maintained to preserve external references.Original DescriptionDirectory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette. | [] |
CVE-2010-0844 | Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is for improper parsing of a crafted MIDI stream when creating a MixerSequencer object, which causes a pointer to be corrupted and allows a NULL byte to be written to arbitrary memory. | [
"cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*"
] |
|
GHSA-w3jf-qpc9-mgp6 | Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677. | [] |
|
GHSA-pmj4-q5f6-462c | In asf extractor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187231635 | [] |
|
CVE-2023-6970 | The WP Recipe Maker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘Referer' header in all versions up to, and including, 9.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:bootstrapped:wp_recipe_maker:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-hmj9-qjcc-6gv7 | Pivotal Operations Manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. A remote malicious user who has been authenticated may create a new client with administrator privileges for Opsman. | [] |
|
CVE-2022-25027 | The Forgotten Password functionality of Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to bypass authentication and access restricted pages by validating the user's session token when the "Password forgotten?" button is clicked. | [
"cpe:2.3:a:rocketsoftware:trufusion_enterprise:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-30795 | Online Ordering System v1.0 by oretnom23 is vulnerable to SQL Injection via admin/editproductimage.php. | [
"cpe:2.3:a:online_ordering_system_project:online_ordering_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-j534-3ccm-843p | WatchGuard Firebox and XTM appliances allow an unauthenticated remote attacker to retrieve sensitive authentication server settings by sending a malicious request to exposed authentication endpoints. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4. | [] |
|
GHSA-pm7h-vr37-wmc9 | Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow an unauthenticated and remote user to exploit a stack-based buffer overflow and crash the web server, resulting in a system reboot. An unauthenticated and remote attacker can execute arbitrary code by sending a crafted HTTP request that triggers the overflow condition via a long URI passed to a sprintf call. NOTE: this is different than CVE-2018-10088, but this may overlap CVE-2017-16725. | [] |
|
CVE-2024-0845 | PDF Viewer for Elementor <= 2.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via render | The PDF Viewer for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the render function in all versions up to, and including, 2.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:redlettuce:pdf_viewer_for_elementor:*:*:*:*:*:wordpress:*:*"
] |
GHSA-2wrv-mv5p-jx2g | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution. | [] |
|
GHSA-86w8-74wf-5cgg | Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes. | [] |
|
CVE-2023-0625 | Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog | Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog.
This issue affects Docker Desktop: before 4.12.0.
| [
"cpe:2.3:a:docker:docker_desktop:*:*:*:*:*:*:*:*"
] |
CVE-2021-43432 | A Cross Site Scripting (XSS) vulnerability exists in Exrick XMall Admin Panel as of 11/7/2021 via the GET parameter in product-add.jsp. | [
"cpe:2.3:a:exrick:xmall:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-1723 | The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation. | [
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*"
] |
|
GHSA-pw3p-vw67-4fjf | Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [] |
|
GHSA-mwxh-q8vv-r69f | Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data. | [] |
|
CVE-2019-13751 | Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] |
|
GHSA-f3r5-jm79-fwqg | in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. | [] |
|
GHSA-877x-wh4j-h3gm | IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 133557. | [] |
|
GHSA-778f-c3r9-6vmp | Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack. | [] |
|
GHSA-w9hf-6273-595m | IBM Jazz Foundation and IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199406. | [] |
|
CVE-2020-27943 | A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in tvOS 14.3, iOS 14.3 and iPadOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.2. Processing a maliciously crafted font file may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-r2x9-77mc-c6x6 | NVIDIA DGX A100 SBIOS contains a vulnerability where a local attacker can cause input validation checks to be bypassed by causing an integer overflow. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering. | [] |
|
CVE-2025-21092 | GMOD Apollo Incorrect Privilege Assignment | GMOD Apollo does not have sufficient logical or access checks when updating a user's information. This could result in an attacker being able to escalate privileges for themselves or others. | [] |
GHSA-2vhm-2m7v-5x2c | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 5.7.1. | [] |
|
CVE-2002-0963 | SQL injection vulnerability in comment.php for GeekLog 1.3.5 and earlier allows remote attackers to obtain sensitive user information via the pid parameter. | [
"cpe:2.3:a:geeklog:geeklog:*:*:*:*:*:*:*:*"
] |
|
GHSA-62q2-c83v-qvq3 | hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password. | [] |
|
GHSA-736c-qmfv-4r4h | In the module "Order Duplicator " Clone and Delete Existing Order" (orderduplicate) in version <= 1.1.7 from Silbersaiten for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can download personal information from ps_customer/ps_address tables such as name / surname / phone number / full postal address. | [] |
|
CVE-2011-2544 | Cross-site scripting (XSS) vulnerability in the web interface in Cisco TelePresence System MXP Series F9.1 and earlier allows remote authenticated users to inject arbitrary web script or HTML via a crafted Call ID, as demonstrated by resultant cross-site request forgery (CSRF) attacks that change passwords or cause a denial of service, aka Bug ID CSCtq46488. | [
"cpe:2.3:h:cisco:telepresence_system_1000_mxp:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_1700_mxp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_mxp_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_mxp_software:f8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_mxp_software:f9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-36gp-jmc7-9mrv | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formParentControl. | [] |
|
GHSA-wxgp-jgc5-77qv | PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path parameter. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.