id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-j29g-g982-pwpv | Cross-site scripting (XSS) | ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution. | [] | null | 4.8 | null | null |
CVE-2020-5984 | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. | [
"cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:virtual_gpu_manager:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2022-26943 | Weak PRNG entropy source used for authentication challenge generation in Motorola MTM5000 | The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400. | [
"cpe:2.3:h:motorola:mtm5000_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2020-26074 | Cisco SD-WAN vManage Privilege Escalation Vulnerability | A vulnerability in system file transfer functions of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to gain escalated privileges on the underlying operating system.
The vulnerability is due to improper validation of path input to the system file transfer functions. An attacker could exploit this vulnerability by sending requests that contain specially crafted path variables to the vulnerable system. A successful exploit could allow the attacker to overwrite arbitrary files, allowing the attacker to modify the system in such a way that could allow the attacker to gain escalated privileges.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | [
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-65m5-fvm9-qxv6 | A vulnerability in the archive utility of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to a lack of proper input validation of paths that are embedded within archive files. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to write arbitrary files in the system with the privileges of the logged-in user. | [] | null | null | null | null |
|
GHSA-fqhm-fjjv-7q8x | CSRF vulnerability in Jenkins openstack-heat Plugin | openstack-heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation.This form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [] | null | 4.3 | null | null |
GHSA-m39q-98qq-xj65 | The filedepot module 6.x-1.x before 6.x-1.3 for Drupal, when accessed using multiple different browsers from the same IP address, causes Internet Explorer sessions to "switch users" when uploading a file, which has unspecified impact possibly involving file uploads to the wrong user directory, aka "Session Management Vulnerability." | [] | null | null | null | null |
|
CVE-2023-1655 | Heap-based Buffer Overflow in gpac/gpac | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-qx4r-rcxh-29h8 | Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to discover the names of private projects if issue-journal details exist that have changes to project_id values. | [] | null | 7.5 | null | null |
|
GHSA-jrpj-fwwj-f68f | Buffer overflow in the receive function in submit/submitcommon.c in the submit daemon in DOMjudge before 2.0.0RC1 allows remote attackers to cause a denial of service or have other unspecified impact. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2020-14068 | An issue was discovered in MK-AUTH 19.01. The web login functionality allows an attacker to bypass authentication and gain client privileges via SQL injection in central/executar_login.php. | [
"cpe:2.3:a:mk-auth:mk-auth:19.01:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2024:1544 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
GHSA-995p-2cvq-xr72 | Vulnerability in the Oracle iRecruitment component of Oracle E-Business Suite (subcomponent: Password Reset). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iRecruitment. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle iRecruitment. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [] | null | null | null | null |
|
GHSA-3fvf-2gp4-89wq | Possibility for Denial of Service by overwriting PHP files with language exports | ImpactLaravel Translation Manager didn't check the locale name, which allowed directory traversal when exporting files. The content would be a PHP file returning an array of translations, but this could lead to unexpected results, like denial of service. Access to the Laravel Translation Manager is required, because a new locale would have to be added and published.PatchesVersion 0.6.2 fixes this issue.WorkaroundsOnly allow trusted admins to publish/edit translations.Referenceshttps://github.com/barryvdh/laravel-translation-manager/pull/417For more informationIf you have any questions or comments about this advisory:Open an issue in https://github.com/barryvdh/laravel-translation-managerEmail me (see Github profile)CreditsFound and reported by [Natalia Trojanowska](https://www.linkedin.com/in/trojanowskanatalia/) | [] | null | null | null | null |
CVE-2013-5001 | Cross-site scripting (XSS) vulnerability in libraries/plugins/transformations/abstract/TextLinkTransformationsPlugin.class.php in phpMyAdmin 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted object name associated with a TextLinkTransformationPlugin link. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2023-21032 | In _ufdt_output_node_to_fdt of ufdt_convert.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-248085351 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
GHSA-584j-c6jj-2crq | Missing Authorization vulnerability in ShortPixel ShortPixel Critical CSS.This issue affects ShortPixel Critical CSS: from n/a through 1.0.2. | [] | null | 7.6 | null | null |
|
GHSA-h5qx-fmw7-7q3f | SQL injection vulnerability in pages.php in Multishop CMS allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-2vr2-94fc-9pcg | Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted lineTo method call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [] | null | null | null | null |
|
GHSA-g7f2-f4hp-4hmj | Certain WithSecure products allow Unauthenticated Remote Code Execution via the web server (backend), issue 2 of 2. This affects WithSecure Policy Manager 15 on Windows and Linux. | [] | null | 9.8 | null | null |
|
CVE-2017-10379 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2013-4124 | Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet. | [
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jj92-w68c-p9x6 | WebKit, as used in Apple iOS before 7.1.2, Apple Safari before 6.1.5 and 7.x before 7.0.5, and Apple TV before 6.1.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-06-30-1, APPLE-SA-2014-06-30-3, and APPLE-SA-2014-06-30-4. | [] | null | null | null | null |
|
GHSA-wvv5-9542-fhxh | In cPanel before 57.9999.54, /scripts/checkinfopages exposed a TTY to an unprivileged process (SEC-114). | [] | null | null | 8.8 | null |
|
GHSA-mhj8-r2ff-pfwm | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Advanced iFrame allows Stored XSS.This issue affects Advanced iFrame: from n/a through 2023.8. | [] | null | 6.5 | null | null |
|
GHSA-2r4j-4fjg-4pm7 | A clickjacking vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found. | [] | null | null | 4.3 | null |
|
CVE-2019-12537 | An issue was discovered in Zoho ManageEngine AssetExplorer. There is XSS via the SearchN.do search field. | [
"cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:6500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:6501:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:6502:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:6503:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:6504:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2018-20918 | cPanel before 70.0.23 allows stored XSS in WHM DNS Cluster (SEC-372). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-jp5v-vcrx-r262 | Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal. | [] | null | null | 5.3 | null |
|
CVE-2012-1370 | Cisco AnyConnect Secure Mobility Client 3.0 before 3.0.08057 allows remote authenticated users to cause a denial of service (vpnagentd process crash) via a crafted packet, aka Bug ID CSCty01670. | [
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:3.0.0629:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:3.0.07059:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-7gcg-gq9c-4rx7 | All versions of Telecrane F25 Series Radio Controls before 00.0A use fixed codes that are reproducible by sniffing and re-transmission. This can lead to unauthorized replay of a command, spoofing of an arbitrary message, or keeping the controlled load in a permanent "stop" state. | [] | null | 8.1 | null | null |
|
CVE-2017-17415 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Count method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4226. | [
"cpe:2.3:a:quest:netvault_backup:11.3.0.12:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2017-1002026 | Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement. | [
"cpe:2.3:a:eventespresso:event_espresso:3.1.37.11.l:*:*:*:free:wordpress:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-c462-f76h-gqhf | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
GHSA-9c26-35wc-9jmc | SQL injection vulnerability in profile.php in PunBB 1.2.4 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a change_email action. | [] | null | null | null | null |
|
CVE-2020-3670 | u'Potential out of bounds read while processing downlink NAS transport message due to improper length check of Information Element(IEI) NAS message container' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCM6125, QCS605, QCS610, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 | [
"cpe:2.3:o:qualcomm:agatti_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:agatti:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
RHSA-2018:1702 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 8.1 | null |
CVE-2018-19766 | Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "GroupRessourceAdmin.jsp" has reflected XSS via the ConnPoolName parameter. | [
"cpe:2.3:a:infovista:vistaportal:5.1:*:*:*:standard:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-g5h3-w546-pj7f | Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry | In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+. | [] | null | 9.8 | null | null |
CVE-2021-1163 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
CVE-2011-0053 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-8c55-f8rh-4fh4 | cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call. | [] | null | 7.5 | null | null |
|
CVE-2022-21951 | Rancher: Weave CNI password is not set if RKE template is used with CNI value overridden | A Cleartext Transmission of Sensitive Information vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden This issue affects: SUSE Rancher Rancher versions prior to 2.5.14; Rancher versions prior to 2.6.5. | [
"cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
PYSEC-2021-470 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fails to consider corner cases where input would be split in such a way that the generated tokens should only contain padding elements. If input is such that `num_tokens` is 0, then, for `data_start_index=0` (when left padding is present), the marked line would result in reading `data[-1]`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [] | null | null | null | null |
GHSA-g6g4-h466-8c58 | In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak. | [] | null | null | 7.5 | null |
|
CVE-2011-3892 | Double free vulnerability in the Theora decoder in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-fp87-873p-j338 | An issue was discovered in Mattermost Mobile Apps before 1.26.0. Local logging is not blocked for sensitive information (e.g., server addresses or message content). | [] | null | null | null | null |
|
GHSA-vv93-j256-hpwh | Buffer overflow in the Address Book username process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe. | [] | null | 9.8 | null | null |
|
GHSA-crq8-23gq-h59r | Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence MSE 8000 devices allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90444. | [] | null | null | null | null |
|
GHSA-826w-c3xh-9h43 | ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c. | [] | null | null | 9.8 | null |
|
CVE-2022-3754 | Weak Password Requirements in thorsten/phpmyfaq | Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
GHSA-35fg-hjcr-j65f | Information exposure in xwiki-platform | ImpactIt's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users.PatchesThe problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1.WorkaroundsThere's no easy workaround other than applying the upgrade.Referenceshttps://jira.xwiki.org/browse/XWIKI-18787For more informationIf you have any questions or comments about this advisory:Open an issue in [JIRA](https://jira.xwiki.org)Email us at [XWiki Security Mailing list](mailto:[email protected]) | [] | null | 5.3 | null | null |
GHSA-h54w-qqq6-jp69 | A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051. | [] | null | 9.8 | null | null |
|
CVE-2015-7439 | Cross-site scripting (XSS) vulnerability in InfoSphere Data Architect (IDA), as distributed in IBM Rational Software Architect 8.5 through 9.5, Rational Software Architect for WebSphere Software (RSA4WS) 8.5 through 9.5, and Rational Software Architect RealTime (RSART) 8.5 through 9.5, allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:8.5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_realtime:9.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:8.5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software:9.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_for_websphere_software\\':8.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:8.5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:9.5.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2021-46968 | s390/zcrypt: fix zcard and zqueue hot-unplug memleak | In the Linux kernel, the following vulnerability has been resolved:
s390/zcrypt: fix zcard and zqueue hot-unplug memleak
Tests with kvm and a kmemdebug kernel showed, that on hot unplug the
zcard and zqueue structs for the unplugged card or queue are not
properly freed because of a mismatch with get/put for the embedded
kref counter.
This fix now adjusts the handling of the kref counters. With init the
kref counter starts with 1. This initial value needs to drop to zero
with the unregister of the card or queue to trigger the release and
free the object. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-754f-5xqj-fwmv | Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to cause a denial of service (unhandled exception and daemon crash) via a crafted packet with a certain opcode that triggers an invalid attempt to allocate a large amount of memory. | [] | null | null | null | null |
|
GHSA-wfvh-v5x6-6v43 | Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges. | [] | null | 6 | null | null |
|
CVE-2023-22491 | gatsby-transformer-remark vulnerable to unsanitized JavaScript code injection | Gatsby is a free and open source framework based on React that helps developers build websites and apps. The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server. To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. A patch has been introduced in `[email protected]` and `[email protected]` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. As a workaround, if an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing. It is encouraged for projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner. | [
"cpe:2.3:a:gatsbyjs:gatsby:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:gatsbyjs:gatsby:6.3.1:*:*:*:*:node.js:*:*"
] | null | 8.1 | null | null |
GHSA-rr3c-f55v-qhv5 | Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents | Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765. | [] | null | null | 7.5 | null |
CVE-2023-28885 | The MyLink infotainment system (build 2021.3.26) in General Motors Chevrolet Equinox 2021 vehicles allows attackers to cause a denial of service (temporary failure of Media Player functionality) via a crafted MP3 file. | [
"cpe:2.3:a:gm:mylink_infotainment_system:2021.3.26:*:*:*:*:*:*:*",
"cpe:2.3:h:gm:chevrolet_equinox:2021:-:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
CVE-2017-3080 | Adobe Flash Player versions 26.0.0.131 and earlier have a security bypass vulnerability related to the Flash API used by Internet Explorer. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-5frx-2qvr-6r92 | An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. | [] | null | 6.5 | null | null |
|
GHSA-w9qp-hfqh-wjg8 | lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361. | [] | null | null | null | null |
|
GHSA-cpgw-3398-vj5w | In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel | [] | null | 4.1 | null | null |
|
GHSA-mg74-mw7r-v7j9 | OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there. | [] | null | null | null | null |
|
CVE-2001-1534 | mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication. | [
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-23869 | Cross-Site Scripting (XSS) vulnerability in Cups Easy | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuanceprint.php, in the issuanceno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. | [
"cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-652g-v3x6-f997 | Cross-Site Request Forgery (CSRF) vulnerability in Fedor Urvanov, Aram Kocharyan Urvanov Syntax Highlighter plugin <= 2.8.33 versions. | [] | null | 4.3 | null | null |
|
GHSA-m6j8-qrc2-r53c | A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK. | [] | null | 8.6 | null | null |
|
RHSA-2015:1898 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Nova instance migration process does not stop when instance is deleted openstack-nova: Deleting instances in resize state fails | [
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7",
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
CVE-2014-0836 | Cross-site scripting (XSS) vulnerability in IBM Security QRadar SIEM 7.2 MR1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-x8rw-qrmg-7cmp | AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE). | [] | null | 9.8 | null | null |
|
CVE-2018-17196 | In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploit this vulnerability. Users should upgrade to 2.1.1 or later where this vulnerability has been fixed. | [
"cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-8mgg-5x65-m4m4 | Command Injection in soletta-dev-app | All versions of `soletta-dev-app` are vulnerable to Command Injection. The package does not validate user input on the `/api/service/status` API endpoint, passing contents of the `service` query parameter to an exec call. This may allow attackers to run arbitrary commands in the system.RecommendationNo fix is currently available. Consider using an alternative module until a fix is made available. | [] | null | null | null | null |
CVE-2018-7278 | An issue was discovered on RLE Protocol Converter FDS-PC / FDS-PC-DP 2.1 devices. Persistent XSS exists in the web server. Remote attackers can inject malicious JavaScript code using the device's BACnet implementation. This is similar to a Cross Protocol Injection with SNMP. | [
"cpe:2.3:o:rletech:fds-pc_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:rletech:fds-pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rletech:fds-pc-dp_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:rletech:fds-pc-dp:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2020-7681 | Directory Traversal | This affects all versions of package marscode. There is no path sanitization in the path provided at fs.readFile in index.js. | [
"cpe:2.3:a:indo-mars:marscode:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null |
GHSA-496h-2qcm-8f8m | Vulnerability in the PeopleSoft Enterprise FSCM component of Oracle PeopleSoft Products (subcomponent: Strategic Sourcing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FSCM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise FSCM accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [] | null | null | 6.5 | null |
|
GHSA-hv5j-9c9v-x427 | Netgear FVG318 running firmware 1.0.40 allows remote attackers to cause a denial of service (router reset) via TCP packets with bad checksums. | [] | null | null | null | null |
|
CVE-2008-4278 | VMware VirtualCenter 2.5 before Update 3 build 119838 on Windows displays a user's password in cleartext when the password contains unspecified special characters, which allows physically proximate attackers to steal the password. | [
"cpe:2.3:a:vmware:virtual_infrastructure_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:*:update_2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.0:unknown:client:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.0.2:update_2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.0.2:update_3:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.0.2:update_4:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.5:update_1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-jjqr-cgpf-g2pm | The Filter SDK in HPE KeyView 10.18 through 10.24 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4387, CVE-2016-4389, and CVE-2016-4390. | [] | null | null | 8.1 | null |
|
GHSA-p6fh-xc6r-g5hw | Brokercap Bifrost subject to authentication bypass when using HTTP basic authentication | Bifrost is a middleware package which can synchronize MySQL/MariaDB binlog data to other types of databases. Versions 1.8.6-release and prior are vulnerable to authentication bypass when using HTTP basic authentication. This may allow group members who only have read permissions to write requests when they are normally forbidden from doing so. Version 1.8.7-release contains a patch. There are currently no known workarounds. | [] | null | 8.5 | null | null |
CVE-2024-1323 | The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post Type Grid Widget Title in all versions up to, and including, 2.10.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2018-21112 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R8900 before 1.0.4.12, and R9000 before 1.0.4.12. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
RHSA-2006:0281 | Red Hat Security Advisory: struts security update for Red Hat Application Server | struts bypass validation security flaw struts LookupDispatchAction XSS | [
"cpe:/a:redhat:rhel_application_server:1",
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
CVE-2007-6628 | LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via (1) a malformed Transport header, which triggers misparsing in parse_transport_header in RTSP_setup.c, as demonstrated by a Transport header that contains only a "RTP/AVP;unicast;client_port" sequence; or (2) a malformed Range header, which triggers misparsing in parse_play_time_range in RTSP_Play, as demonstrated by an empty Range header. | [
"cpe:2.3:a:feng:feng:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-w4x3-44p5-962m | BigTree CMS through 4.2.18 does not prevent a user from deleting their own account. This could have security relevance because deletion was supposed to be an admin-only action, and the admin may have other tasks (such as data backups) to complete before a user is deleted. | [] | null | null | 6.5 | null |
|
GHSA-5fg4-p46p-w9g4 | Vulnerability in the Oracle Retail Point-of-Service component of Oracle Retail Applications (subcomponent: User Interface). Supported versions that are affected are 13.3.8, 13.4.9, 14.0.4 and 14.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Point-of-Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Point-of-Service accessible data as well as unauthorized update, insert or delete access to some of Oracle Retail Point-of-Service accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). | [] | null | null | 7.1 | null |
|
CVE-2008-0528 | Buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SIP firmware might allow remote attackers to execute arbitrary code via a SIP message with crafted MIME data. | [
"cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:skinny_client_control_protocol_\\(sccp\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:session_initiation_protocol_\\(sip\\)_firmware:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2018-19037 | On Virgin Media wireless router 3.0 hub devices, the web interface is vulnerable to denial of service. When POST requests are sent and keep the connection open, the router lags and becomes unusable to anyone currently using the web interface. | [
"cpe:2.3:o:virginmedia:hub_3.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:virginmedia:hub_3.0:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-p22g-7hp6-wj84 | The Meeting component in Huawei eSpace Desktop before V100R001C03 allows local users to cause a denial of service (program exit) via a crafted image. | [] | null | null | null | null |
|
GHSA-3w7p-gc55-64xr | A Path Traversal vulnerability in the diagnostic shell for Cisco IOS and IOS XE Software could allow an authenticated, local attacker to use certain diagnostic shell commands that can overwrite system files. These system files may be sensitive and should not be able to be overwritten by a user of the diagnostic shell. The vulnerability is due to lack of proper input validation for certain diagnostic shell commands. An attacker could exploit this vulnerability by authenticating to the device, entering the diagnostic shell, and providing crafted user input to commands at the local diagnostic shell CLI. Successful exploitation could allow the attacker to overwrite system files that should be restricted. Cisco Bug IDs: CSCvg41950. | [] | null | null | 5.5 | null |
|
GHSA-8vf4-cp85-x9v7 | The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action. | [] | null | 6.1 | null | null |
|
CVE-2019-4513 | IBM Security Access Manager for Enterprise Single Sign-On 8.2.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 164555. | [
"cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2.2:*:*:*:*:*:*:*"
] | null | null | 8.2 | null |
|
GHSA-grqq-prph-hfgm | Windows MSHTML Platform Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2023-0196 |
NVIDIA CUDA Toolkit SDK contains a bug in cuobjdump, where a local user running the tool against an ill-formed binary may cause a null- pointer dereference, which may result in a limited denial of service.
| [
"cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2023-50443 | Encrypted disks created by PRIMX CRYHOD for Windows before Q.2020.4 (ANSSI qualification submission) or CRYHOD for Windows before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger outbound network traffic from computers on which disks are opened. | [
"cpe:2.3:a:primx:cryhod:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
GHSA-992x-4rhv-25qp | kapfa.sys in Kaseya Virtual System Administrator (VSA) 6.5 before 6.5.0.17 and 7.0 before 7.0.0.16 allows local users to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-qx3r-xm4v-rgrh | The QNAP TS-239 Pro and TS-639 Pro with firmware 2.1.7 0613, 3.1.0 0627, and 3.1.1 0815 use the rand library function to generate a certain recovery key, which makes it easier for local users to determine this key via a brute-force attack. | [] | null | 5.5 | null | null |
|
CVE-2023-48644 | An issue was discovered in the Archibus app 4.0.3 for iOS. There is an XSS vulnerability in the create work request feature of the maintenance module, via the description field. This allows an attacker to perform an action on behalf of the user, exfiltrate data, and so on. | [
"cpe:2.3:a:eptura:archibus_ios_application:4.0.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-76p7-xgvr-6gqw | LiteManager 4.5.0 has weak permissions (Everyone: Full Control) in the "LiteManagerFree - Server" folder, as demonstrated by ROMFUSClient.exe. | [] | null | null | null | null |
Subsets and Splits