id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-42900 | Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read issues when opening crafted FBX files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View. | [
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
RHSA-2021:5171 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2021-41121 | Memory corruption in Vyper | Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0. | [
"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2004-0781 | Cross-site scripting (XSS) vulnerability in list.cgi in the Icecast internal web server (icecast-server) 1.3.12 and earlier allows remote attackers to inject arbitrary web script via the UserAgent parameter. | [
"cpe:2.3:a:icecast:icecast:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:icecast:icecast:1.3.12:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-37344 | WordPress Accommodation System plugin <= 1.0.1 - Missing Access Control vulnerability | Missing Access Control vulnerability in PHP Crafts Accommodation System plugin <= 1.0.1 at WordPress. | [
"cpe:2.3:a:accommodation-system_project:accommodation-system:*:*:*:*:*:wordpress:*:*"
] | null | 7.6 | null | null |
GHSA-2p5c-r4xc-mhvw | A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload files and run OS commands by inducing the Administrator user to browse a URL controlled by an attacker. | [] | null | null | null | null |
|
GHSA-hmh4-r5p6-2v44 | Post Oak AWAM Bluetooth Field Device 7400v2.08.21.2018, 7800SD.2015.1.16, 2011.3, 7400v2.02.01.2019, and 7800SD.2012.12.5 is vulnerable to injections of operating system commands through timeconfig.py via shell metacharacters in the htmlNtpServer parameter. | [] | null | null | null | null |
|
GHSA-6265-r5jg-4h87 | Free Realty before 2.9 allows remote attackers to obtain the full path and other sensitive information via unspecified manipulations that produce an error message. | [] | null | null | null | null |
|
GHSA-w42f-w92v-v257 | A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "mobilenumber" to be affected. But it must be assumed that other parameters are affected as well. | [] | 5.3 | 6.3 | null | null |
|
GHSA-9qpx-3xf9-26m7 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in falldeaf WP ViewSTL allows DOM-Based XSS.This issue affects WP ViewSTL: from n/a through 1.0. | [] | null | 6.5 | null | null |
|
GHSA-cj2m-xh7j-q94r | A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.2.0 through 5.2.11 and 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via the "Groups" input while creating or editing User Groups. | [] | null | null | 5.4 | null |
|
CVE-2014-7701 | The DoNotTrackMe - Mobile Privacy (aka com.abine.dnt) application 1.1.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:abine:donottrackme_-_mobile_privacy:1.1.8:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
RHSA-2003:022 | Red Hat Security Advisory: glibc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
CVE-2023-26394 | ZDI-CAN-20236: Adobe Substance 3D Stager USD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-hm99-p7fw-6wr3 | Opera before 12.10 does not properly implement the Cross-Origin Resource Sharing (CORS) specification, which allows remote attackers to bypass intended page-content restrictions via a crafted request. | [] | null | null | null | null |
|
CVE-2023-41027 | Juplink RX4-1500 Credential Disclosure Vulnerability | Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
| [
"cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juplink:rx4-1500_firmware:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juplink:rx4-1500_firmware:1.0.5:*:*:*:*:*:*:*"
] | null | 8 | null | 7.7 |
GHSA-hjwh-qg8v-mp9r | An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can modify admin and other members' passwords. | [] | null | 6.5 | null | null |
|
GHSA-h3w5-2c4f-pmfr | IBM Sterling External Authentication Server 3.4.3.2, 6.0.2.0, and 6.0.3.0 is vulnerable to path traversals, due to not properly validating RESTAPI configuration data. An authorized user could import invalid data which could be used for an attack. IBM X-Force ID: 220144. | [] | null | null | null | null |
|
GHSA-54gm-34p3-cx2g | Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680. | [] | null | null | null | null |
|
CVE-2017-18294 | While reading file class type from ELF header, a buffer overread may happen if the ELF file size is less than the size of ELF64 header size in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version FSM9055, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDA660, SDX20. | [
"cpe:2.3:o:qualcomm:fsm9055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2022-43476 | WordPress Subscribe to Category Plugin <= 2.7.4 is vulnerable to Broken Access Control | Missing Authorization vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Subscribe to Category: from n/a through 2.7.4. | [] | null | 4.3 | null | null |
RHSA-2019:3387 | Red Hat Security Advisory: osinfo-db and libosinfo security and bug fix update | Libosinfo: osinfo-install-script option leaks password via command line argument | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 2.8 | null |
CVE-2013-6017 | Cross-site scripting (XSS) vulnerability in Atmail Webmail Server before 7.2 allows remote attackers to inject arbitrary web script or HTML via the body of an e-mail message, as demonstrated by the SRC attribute of an IFRAME element. | [
"cpe:2.3:a:atmail:atmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.10:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.12:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atmail:atmail:7.1.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-qg8w-4xw5-c8px | Buffer overflow in the DXTTextOutEffect ActiveX control (aka the Text-Effect DXT Filter), as distributed in TextOut.dll 6.0.18.1 and mvtextout.dll, in muvee autoProducer 6.0 and 6.1 allows remote attackers to execute arbitrary code via a long FontSetting property value. | [] | null | null | null | null |
|
GHSA-534x-f3w4-g6x6 | Multiple memory leaks in IBM Lotus Notes and Domino Server before 6.5.5 allow attackers to cause a denial of service (memory consumption and crash) via unknown vectors related to (1) unspecified vectors during the SSL handshake (SPR# MKIN67MQVW), (2) the stash file during the SSL handshake (SPR# MKIN693QUT), and possibly other vectors. NOTE: due to insufficient information in the original vendor advisory, it is not clear whether there is an attacker role in other memory leaks that are specified in the advisory. | [] | null | null | null | null |
|
CVE-2020-11949 | testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices. | [
"cpe:2.3:o:vivotek:cc9381-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cc9381-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9360-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9360-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9368-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9368-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9380-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9380-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9388-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9388-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9360-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9360-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9368-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9368-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9380-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9380-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9388-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9388-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:it9360-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:it9360-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:it9380-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:it9380-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:it9388-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:it9388-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md9560-dh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md9560-dh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md9560-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md9560-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9366-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9366-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9166-hn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9166-hn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9380-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9380-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:cc8160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cc8160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:cc8160\\(hs\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cc8160\\(hs\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:cc8370-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cc8370-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:cc8371-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cc8371-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:cd8371-hntv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cd8371-hntv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:cd8371-hnvf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:cd8371-hnvf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8166a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8166a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8166a-n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8166a-n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8167a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8167a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8169a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8169a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8367a-v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8367a-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8369a-v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8369a-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd816ba-hf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd816ba-hf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836ba-hvf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836ba-hvf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836ba-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836ba-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836ba-ehvf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836ba-ehvf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd816ba-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd816ba-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836ba-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836ba-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836ba-ehf3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836ba-ehf3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836ba-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836ba-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836ba-hf3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836ba-hf3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836ba-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836ba-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd816b-hf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd816b-hf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd816b-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd816b-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836b-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836b-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836b-ehvf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836b-ehvf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836b-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836b-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd836b-hvf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd836b-hvf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836b-ehf3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836b-ehf3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836b-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836b-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836b-hf3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836b-hf3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836b-hrf3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836b-hrf3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib836b-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib836b-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd816ca-hf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd816ca-hf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd816c-hf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd816c-hf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8182-f1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8182-f1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8182-f2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8182-f2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8182-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8182-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8382-etv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8382-etv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8382-evf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8382-evf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8382-tv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8382-tv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8382-vf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8382-vf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8382-ef3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8382-ef3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8382-et_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8382-et:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8382-f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8382-f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8382-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8382-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8366-v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8366-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8367a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8367a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8369a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8369a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip8166_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip8166:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md8563-deh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md8563-deh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md8563-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md8563-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md8564-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md8564-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md8565-n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md8565-n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:vc8101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:vc8101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:vs8100-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:vs8100-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip8160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip8160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip8160-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip8160-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8360-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8360-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9171-hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9171-hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9181-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9181-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9371-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9371-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9381-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9381-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9371-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9371-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9381-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9381-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9171-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9171-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9181-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9181-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9181-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9181-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9182-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9182-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9381-ehv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9381-ehv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9382-ehv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9382-ehv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9180-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9180-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9582-ehnv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9582-ehnv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9161-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9161-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9361-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9361-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9362-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9362-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9362-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9362-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9363-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9363-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9364-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9364-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9364-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9364-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9363-ehl-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9363-ehl-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9364-ehl-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9364-ehl-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9362-eh-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9362-eh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9364-eh-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9364-eh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9366-eh-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9366-eh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9366-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9366-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9366-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9366-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9365-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9365-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:iz9361-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:iz9361-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9187-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9187-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9187-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9187-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9387-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9387-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9387-ehv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9387-ehv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9387-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9387-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9387-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9387-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9387-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9387-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9387-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9387-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9387-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9387-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9387-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9387-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9189-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9189-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9189-hm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9189-hm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9189-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9189-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9389-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9389-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9389-hmv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9389-hmv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9389-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9389-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9389-ehmv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9389-ehmv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9389-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9389-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9389-ehv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9389-ehv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9389-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9389-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9389-ehm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9389-ehm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9389-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9389-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9389-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9389-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9389-hm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9389-hm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9389-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9389-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9165-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9165-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9365-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9365-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9365-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9365-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9365-htvl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9365-htvl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9365-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9365-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9365-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9365-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9165-hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9165-hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9165-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9165-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9165-lpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9165-lpc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9391-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9391-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9191_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9191:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9191-hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9191-hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9191-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9191-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fe9391-ev_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fe9391-ev:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9391-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9391-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9172-lpc\\(freeway\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9172-lpc\\(freeway\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:it9389-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:it9389-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:it9389-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:it9389-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md9561-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md9561-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:md9581-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:md9581-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ms9390-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ms9390-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:tb9330-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:tb9330-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:tb9331-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:tb9331-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:sd9374-ehl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:sd9374-ehl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9167-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9167-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9167-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9167-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9367-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9367-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9367-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9367-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9367-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9367-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9367-htv\\(epoc\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9367-htv\\(epoc\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9367-eh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9367-eh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9367-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9367-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9367-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9367-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9367-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9367-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9167-hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9167-hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9167-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9167-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ma9321-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ma9321-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ms9321-ehv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ms9321-ehv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ma9322-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ma9322-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8177-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8177-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8377-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8377-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8177-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8177-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8377-ehtv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8377-ehtv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8377-htv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8377-htv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8179-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8179-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd8379-hv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd8379-hv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8377-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8377-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8377-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8377-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib8377-eht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib8377-eht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9165-ht-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9165-ht-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9365-htv-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9365-htv-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9365-ehtv-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9365-ehtv-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9187-ht-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9187-ht-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9387-htv-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9387-htv-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:fd9387-ehtv-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:fd9387-ehtv-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9365-eht-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9365-eht-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9365-ht-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9365-ht-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9387-eht-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9387-eht-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ib9387-ht-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ib9387-ht-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9164-ht_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9164-ht:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9164-lpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9164-lpc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:ip9165-lpc\\(i-cs_kit\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:ip9165-lpc\\(i-cs_kit\\):-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-r48c-4vfj-h426 | collective.dms.basecontent Cross-site Scripting vulnerability | A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability. | [] | 5.1 | 6.1 | null | null |
GHSA-cvwm-vf9r-8r57 | VMware vCenter Server (6.5 prior to 6.5 U1) contains an insecure library loading issue that occurs due to the use of LD_LIBRARY_PATH variable in an unsafe manner. Successful exploitation of this issue may allow unprivileged host users to load a shared library that may lead to privilege escalation. | [] | null | null | 8.8 | null |
|
GHSA-8rjr-96wc-j9h5 | Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges. | [] | null | null | null | null |
|
CVE-2025-22369 | Mennekes smart/premium charges systems, Arbitrary file download using ReadFile endpoint | The ReadFile endpoint of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to read arbitrary files from the underlying OS. | [] | 7.1 | null | null | null |
GHSA-rrf8-xx2r-rw7h | Cross-site scripting vulnerability in E-mail of Cybozu Office 10.0.0 to 10.8.4 allows remote attackers to inject an arbitrary script via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2023:2166 | Red Hat Security Advisory: freeradius security and bug fix update | freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
CVE-2019-6767 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8163. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7 | null |
|
GHSA-p458-c575-82fh | Archer Platform 6.x before 6.14 P1 HF2 (6.14.0.1.2) contains an insecure direct object reference vulnerability. An authenticated malicious user in a multi-instance installation could potentially exploit this vulnerability by manipulating application resource references in user requests to bypass authorization checks, in order to gain execute access to AWF application resources. | [] | null | 7.5 | null | null |
|
CVE-2011-1682 | Multiple cross-site request forgery (CSRF) vulnerabilities in phpList 2.10.13 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) create a list or (2) insert cross-site scripting (XSS) sequences. NOTE: this issue exists because of an incomplete fix for CVE-2011-0748. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.5b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.12:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2001-0357 | FormMail.pl in FormMail 1.6 and earlier allows a remote attacker to send anonymous email (spam) by modifying the recipient and message parameters. | [
"cpe:2.3:a:matt_wright:formmail:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-545v-3hf5-cppv | The Loan Comparison WordPress plugin before 1.5.3 does not validate and escape some of its query parameters before outputting them back in a page/post via an embedded shortcode, which could allow an attacker to inject javascript into into the site via a crafted URL. | [] | null | 6.1 | null | null |
|
CVE-2021-30954 | A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2018-21226 | Certain NETGEAR devices are affected by authentication bypass. This affects JNR1010v2 before 1.1.0.48, JWNR2010v5 before 1.1.0.48, WNR1000v4 before 1.1.0.48, WNR2020 before 1.1.0.48, and WNR2050 before 1.1.0.48. | [
"cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
CVE-2024-36538 | Insecure permissions in chaos-mesh v2.6.3 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token. | [
"cpe:2.3:a:chaos-mesh:chaos-mesh:2.6.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-cp2q-q422-62q5 | SQL injection vulnerability in viewthread.php in Oxygen (O2PHP Bulletin Board) 1.1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter, a different vector than CVE-2006-1572. | [] | null | null | null | null |
|
CVE-2023-40175 | Inconsistent Interpretation of HTTP Requests in puma | Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:puma:puma:-:*:*:*:*:ruby:*:*",
"cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*"
] | null | 7.3 | null | null |
CVE-2021-38833 | SQL injection vulnerability in PHPGurukul Apartment Visitors Management System (AVMS) v. 1.0 allows attackers to execute arbitrary SQL statements and to gain RCE. | [
"cpe:2.3:a:apartment_visitors_management_system_project:apartment_visitors_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-6w44-6jp6-9hq9 | A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | [] | null | 7.8 | null | null |
|
GHSA-xc36-3p8q-x8x7 | Cross-site scripting (XSS) vulnerability in the setTimeout function in js/jquery.prettyPhoto.js in prettyPhoto 3.1.4 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted PATH_INTO to the default URI. | [] | null | null | null | null |
|
CVE-2016-9193 | A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0. | [
"cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-m45f-4828-5cv5 | Regular Expression Denial of Service in highcharts | Withdrawn: Duplicate of GHSA-xmc8-cjfr-phx3 | [] | null | null | null | null |
GHSA-pq62-7rf2-mhcm | The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered
devices on the AirVantage platform when the owner has not disabled the AirVantage Management
Service on the devices or registered the device. This could enable an attacker to configure, manage,
and execute AT commands on an unsuspecting user’s devices. | [] | null | 8.1 | null | null |
|
GHSA-vq25-79f6-fj7m | Multiple heap-based buffer overflows in EMC RepliStor 6.2 before SP5 and 6.3 before SP2 allow remote attackers to execute arbitrary code via a crafted message to (1) ctrlservice.exe or (2) rep_srv.exe, possibly related to an integer overflow. | [] | null | null | null | null |
|
CVE-2025-21537 | Vulnerability in the PeopleSoft Enterprise FIN Cash Management product of Oracle PeopleSoft (component: Cash Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Cash Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Cash Management accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Cash Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_fin_cash_management:9.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-jj6v-6227-3v35 | Buffer overflow in an unspecified third-party component in the Batch module for Schneider Electric CitectSCADA before 7.20 and Mitsubishi MX4 SCADA before 7.20 allows local users to execute arbitrary code via a long string in a login sequence. | [] | null | null | null | null |
|
CVE-2020-23705 | A global buffer overflow vulnerability in jfif_encode at jfif.c:701 of ffjpeg through 2020-06-22 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file. | [
"cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-gc36-7w2h-fcxp | The Central East LHIN News (aka com.wCentralEastLHINNews) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2024-40803 | A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An attacker may be able to cause unexpected app termination. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2009-0642 | ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate. | [
"cpe:2.3:a:ruby-lang:ruby:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-4hgp-5v89-5fhw | A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability. | [] | null | 5.5 | null | null |
|
GHSA-jq36-q2p2-4x9m | OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database. | [] | null | 7.5 | null | null |
|
CVE-2024-33831 | A stored cross-site scripting (XSS) vulnerability in the Advanced Expectation - Response module of yapi v1.10.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the body field. | [
"cpe:2.3:a:ymfe:yapi:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
CVE-2017-17553 | The Dolphin Browser for Android 12.0.2 suffers from an insecure parsing implementation of the Intent URI scheme. This vulnerability could allow attackers to abuse this implementation through a malicious Intent URI, in order to invoke private Activities within the Dolphin Browser. | [
"cpe:2.3:a:changyou:dolphin:12.0.2:*:*:*:*:android:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2009-3864 | The Java Update functionality in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22 and JDK and JRE 6 before Update 17, when a non-English version of Windows is used, does not retrieve available new JRE versions, which allows remote attackers to leverage vulnerabilities in older releases of this software, aka Bug Id 6869694. | [
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update9:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hh2p-3xp6-2fg7 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when processing a clip with large size values, integer arithmetic overflows, and allocated buffer size will be less than intended buffer size. The following buffer operations will overflow the allocated buffer. | [] | null | null | 9.8 | null |
|
CVE-2014-9436 | Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile. | [
"cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2015-2429 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow attackers to bypass an application sandbox protection mechanism and perform unspecified registry actions via a crafted application, aka "Windows Registry Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-445q-7482-76fp | In JetBrains TeamCity before 2024.12 backup file exposed user credentials and session cookies | [] | null | 5.5 | null | null |
|
GHSA-5624-47cx-2qwc | Cloudlog 2.6.15 allows Oqrs.php delete_oqrs_line id SQL injection. | [] | null | 7.3 | null | null |
|
CVE-2007-0527 | SQL injection vulnerability in the is_remembered function in class.login.php in Website Baker 2.6.5 and earlier allows remote attackers to execute arbitrary SQL commands via the REMEMBER_KEY cookie parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:website_baker:website_baker:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-23qq-p4gq-gc2g | WordOps has TOCTOU race condition | WordOps through 3.20.0 has a `wo/cli/plugins/stack_pref.py` TOCTOU race condition because the `conf_path` `os.open` does not use a mode parameter during file creation. | [] | 4.1 | 7.7 | null | null |
CVE-2018-12027 | An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said socket are writable by a normal user that is not the application's user, then that non-application user can swap that directory with something else, resulting in traffic being redirected to a non-application user's process through an alternative Unix domain socket. | [
"cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-2023-45471 | The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page. | [
"cpe:2.3:a:qad:search_server:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-xq5f-vwcq-j4f3 | PHP remote file inclusion vulnerability in resources/includes/popp.config.loader.inc.php in PopSoft Digital PopPhoto Studio 3.5.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter (cfg['popphoto_base_path'] variable). NOTE: Pixaria has notified CVE that "PopPhoto is NOT a product of Pixaria. It was a product of PopSoft Digital and is only hosted by Pixaria as a courtesy... The vulnerability listed was patched by the previous vendor and all previous users have received this update." | [] | null | null | null | null |
|
GHSA-2rrh-8pm2-3q2c | iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration. | [] | null | 9.8 | null | null |
|
RHSA-2020:4464 | Red Hat Security Advisory: libxslt security update | libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | 6.3 | null |
CVE-2024-52960 | A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests. | [] | null | 4.2 | null | null |
|
GHSA-36ww-x63p-687w | Cross-site scripting (XSS) vulnerability in Joomla BSQ Sitestats 1.8.0 and 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header, which is not properly handled when the administrator views site statistics. | [] | null | null | null | null |
|
GHSA-h4xg-qr4x-74g2 | Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: File Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 5.3 | null |
|
CVE-2023-38744 | Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier. | [
"cpe:2.3:h:omron:cj2m_cpu_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h_cpu_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cs_cj_series_ethernet_ip_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu35_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu34_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu33_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu31_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cs1w-eip21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cs1w-eip21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj1w-eip21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj1w-eip21:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-455m-q3h9-34pf | Downloads Resources over HTTP in windows-seleniumjar-mirror | Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar-mirror`.RecommendationNo patch is currently available for this vulnerability.Currently, the best mitigation is to download the selenium jar file manually from [seleniumHQ](https://www.seleniumhq.org/download/).Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | null | null | null | null |
RHSA-2014:0038 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update | rhev: remote-viewer spice tls-stripping issue | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
GHSA-q4w6-wqgp-2r7m | The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection. | [] | null | 7.5 | null | null |
|
CVE-2018-4966 | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-rxh5-g4jr-gfxr | Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M use a linear algorithm for selecting the ID value in the header of a DNS query performed on behalf of the device itself, which makes it easier for remote attackers to spoof responses by including this ID value, as demonstrated by a response containing the address of the firmware update server, a different vulnerability than CVE-2015-2914. | [] | null | null | null | null |
|
GHSA-456x-j3xw-5vwm | SQL injection vulnerability in login.php in TheWebForum (twf) 1.2.1 allows remote attackers to execute arbitrary SQL commands and bypass login authentication via the username parameter (aka the u variable). | [] | null | null | null | null |
|
ICSA-20-343-01 | Multiple Embedded TCP/IP Stacks | The function used in uIP-Contiki-OS to process IPv6 extension headers and extension header options can be forced into an infinite loop state due to unchecked header/option lengths.CVE-2020-13984 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function used in uIP-Contiki-OS to decapsulate RPL extension headers does not check for unsafe integer conversion when parsing the values provided in a header, allowing an attacker to corrupt memory.CVE-2020-13985 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function used in uIP-Contiki-OS to decapsulate RPL extension headers does not check the length value of an RPL extension header received, allowing an attacker to cause it to enter an infinite loop.CVE-2020-13986 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in open-iscsi, uIP-Contiki-OS, and uIP that parses incoming transport layer packets (TCP/UDP) does not check the length fields of packet headers against the data available in the packets. Given arbitrary lengths, an out-of-bounds memory read may be performed during the checksum computation.CVE-2020-13987 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in open-iscsi, uIP-Contiki-OS, and uIP that parses the TCP MSS option does not check the validity of the length field of this option, allowing an attacker to force it into an infinite loop when arbitrary TCP MSS values are supplied.CVE-2020-13988 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). When handling TCP urgent data in open-iscsi, uIP-Contiki-OS, and uIP, there are no sanity checks for the value of the urgent data pointer, allowing an attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets.CVE-2020-17437 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). The function in open-iscsi and uIP that reassembles fragmented packets does not validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. This could lead to memory corruption.CVE-2020-17438 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H). Incoming DNS replies in uIP are parsed by the DNS client even if there were no outgoing queries. The DNS transaction ID is not sufficiently random. Provided that the DNS cache is quite small (four entries), this facilitates DNS cache poisoning attacks.CVE-2020-17439 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L). When parsing incoming DNS packets in uIP-Contiki-NG, uIP-Contiki-OS, and uIP, there are no checks whether domain names are null-terminated. This allows an attacker to achieve memory corruption with crafted DNS responses.CVE-2020-17440 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). In picoTCP-NG and picoTCP the payload length field of IPv6 extension headers are not checked against the data available in incoming packets, allowing an attacker to corrupt memory.CVE-2020-17441 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP-NG and picoTCP that processes the hop-by-hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing an attacker to cause the function to enter an infinite loop by supplying arbitrary length values.CVE-2020-17442 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). When processing ICMPv6 echo requests in picoTCP-NG and picoTCP, there are no checks for whether the ICMPv6 header consists of at least 8 bytes (set by RFC443). This leads to the function that creates ICMPv6 echo replies based on a received request with a smaller header to corrupt memory.CVE-2020-17443 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in picoTCP-NG and picoTCP that processes IPv6 headers does not check the lengths of extension header options, allowing an attacker to force this function into an infinite loop with crafted length values.CVE-2020-17444 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP-NG and picoTCP that processes the IPv6 destination options extension header does not check the validity of its options lengths, allowing an attacker to corrupt memory and/or put the function into an infinite loop with crafted length values.CVE-2020-17445 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in FNET does not check whether domain names are null terminated when parsing Link-local Multicast Name Resolution (LLMNR) requests. This may allow an attacker to read out of bounds.CVE-2020-17467 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in FNET that processes the IPv6 hop-by-hop extension header does not check the validity of its options lengths, allowing an attacker to corrupt memory.CVE-2020-17468 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The IPv6 packet reassembly function in FNET does not check whether the received fragments are properly aligned in memory, allowing an attacker to perform memory corruption with crafted IPv6 fragmented packets.CVE-2020-17469 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in FNET that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they will be always set to 1), facilitating DNS cache poisoning attacks.CVE-2020-17470 has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N). The function in uIP-Contiki-NG, uIP-Contiki-OS, and uIP that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, which may allow an attacker to corrupt memory.CVE-2020-24334 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in uIP-Contiki-NG, uIP-Contiki-OS, and uIP that parses domain names lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.CVE-2020-24335 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in uIP-Contiki-NG and uIP-Contiki-OS for parsing DNS records in DNS response packets sent over NAT64 does not validate the length field of the response records, allowing an attacker to corrupt memory.CVE-2020-24336 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The function in picoTCP-NG and picoTCP that processes TCP options does not validate their lengths, allowing an attacker to put the function into an infinite loop with uncommon/unsupported TCP options that have crafted length values.CVE-2020-24337 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP and picoTCP-NG that parses domain names lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.CVE-2020-24338 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The function in picoTCP and picoTCP-NG that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing an attacker to perform memory corruption.CVE-2020-24339 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP and picoTCP-NG that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing an attacker to perform memory corruption.CVE-2020-24340 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The TCP input data processing function in picoTCP-NG and picoTCP does not validate the length of incoming TCP packets, allowing an attacker to read out of bounds and perform memory corruption.CVE-2020-24341 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). When parsing incoming DNS packets in FNET,there are no checks whether domain names are null-terminated. This may allow an attacker to achieve memory corruption and/or memory leak.CVE-2020-24383 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25107 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25108 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25109 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25110 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25111 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Vulnerabilities in uIP-Contiki-OS (EOL) provide insufficient checks for the IPv4/IPv6 header length and inconsistent checks for the IPv6 header extension lengths, which may allow an attacker to corrupt memory.CVE-2020-25112 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 8.1 | null |
CVE-2025-1052 | Mintty Sixel Image Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Mintty Sixel Image Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mintty. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of sixel images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-23382. | [] | null | null | 8.8 | null |
CVE-2016-1816 | IOAcceleratorFamily in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-ff4q-64jc-gx98 | IdentityServer Open Redirect vulnerability | ImpactIt is possible for an attacker to craft malicious Urls that certain functions in IdentityServer will incorrectly treat as local and trusted. If such a Url is returned as a redirect, some browsers will follow it to a third-party, untrusted site._Note: by itself, this vulnerability does **not** allow an attacker to obtain user credentials, authorization codes, access tokens, refresh tokens, or identity tokens. An attacker could however exploit this vulnerability as part of a phishing attack designed to steal user credentials._Affected MethodsIn the `DefaultIdentityServerInteractionService`, the `GetAuthorizationContextAsync` method may return non-null and the `IsValidReturnUrl` method may return true for malicious Urls, indicating incorrectly that they can be safely redirected to._UI code calling these two methods is the most commonly used code path that will expose the vulnerability. The default UI templates rely on this behavior in the Login, Challenge, Consent, and Account Creation pages. Customized user interface code might also rely on this behavior. The following uncommonly used APIs are also vulnerable:_The `ServerUrlExtensions.GetIdentityServerRelativeUrl`, `ReturnUrlParser.ParseAsync` and `OidcReturnUrlParser.ParseAsync` methods may incorrectly return non-null, and the `ReturnUrlParser.IsValidReturnUrl` and `OidcReturnUrlParser.IsValidReturnUrl` methods may incorrectly return true for malicious Urls.PatchesThis vulnerability is fixed in the following versions of Duende.IdentityServer:7.0.66.3.106.2.56.1.86.0.5Duende.IdentityServer 5.1 and earlier and all versions of IdentityServer4 are no longer supported and will not be receiving updates.WorkaroundsIf upgrading is not possible, use `IUrlHelper.IsLocalUrl` from ASP.NET Core 5.0 or later to validate return Urls in user interface code in the IdentityServer host. | [] | 5.1 | 4.7 | null | null |
CVE-2024-2561 | 74CMS Company Logo Index.php#sendCompanyLogo unrestricted upload | A vulnerability, which was classified as critical, has been found in 74CMS 3.28.0. Affected by this issue is the function sendCompanyLogo of the file /controller/company/Index.php#sendCompanyLogo of the component Company Logo Handler. The manipulation of the argument imgBase64 leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257060. | [
"cpe:2.3:a:74cms:74cms:3.28.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-76h3-fc3v-q78j | An arbitrary file upload vulnerability in the component /php_action/editProductImage.php of Billing System Project v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | [] | null | 7.2 | null | null |
|
RHSA-2024:3575 | Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 enhancement and security update | keycloak: Unguarded admin REST API endpoints allows low privilege users to use administrative functionalities keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie | [
"cpe:/a:redhat:build_keycloak:22"
] | null | 7.5 | null | null |
GHSA-4w94-8ff7-4xmw | An improper authentication issue was discovered in Johnson & Johnson Ethicon Endo-Surgery Generator Gen11, all versions released before November 29, 2017. The security authentication mechanism used between the Ethicon Endo-Surgery Generator Gen11 and single-patient use products can be bypassed, allowing for unauthorized devices to be connected to the generator, which could result in a loss of integrity or availability. | [] | null | null | 4.8 | null |
|
CVE-2024-28226 | Fs has an improper input validation vulnerability | in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input. | [] | null | 8.1 | null | null |
CVE-2023-30216 | Insecure permissions in the updateUserInfo function of newbee-mall before commit 1f2c2dfy allows attackers to obtain user account information. | [
"cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2024-23940 | Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system. | [
"cpe:2.3:a:trendmicro:air_support:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:antivirus_\\+_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:maximum_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:premium_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2014-4875 | CreateBossCredentials.jar in Toshiba CHEC before 6.6 build 4014 and 6.7 before build 4329 contains a hardcoded AES key, which allows attackers to discover Back Office System Server (BOSS) DB2 database credentials by leveraging knowledge of this key in conjunction with bossinfo.pro read access. | [
"cpe:2.3:a:toshiba:chec:*:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:chec:6.7:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-f432-537h-hwj6 | A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | [] | null | null | 6.6 | null |
|
CVE-2022-24788 | Buffer overflow in Vyper | Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue. | [
"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2021-22916 | In Brave Desktop between versions 1.17 and 1.26.60, when adblocking is enabled and a proxy browser extension is installed, the CNAME adblocking feature issues DNS requests that used the system DNS settings instead of the extension's proxy settings, resulting in possible information disclosure. | [
"cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
CVE-2016-2952 | IBM BigFix Remote Control before 9.1.3 does not enable the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by leveraging use of HTTP. | [
"cpe:2.3:a:ibm:bigfix_remote_control:*:*:*:*:*:*:*:*"
] | null | null | 3.7 | 4.3 |
|
GHSA-9gcc-m7qq-467x | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Artem Abramovich Art Decoration Shortcode plugin <= 1.5.6 versions. | [] | null | 6.5 | null | null |
|
CVE-2023-44416 | D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability | D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622. Authentication is required to exploit this vulnerability.
The specific flaw exists within the CLI service, which listens on TCP port 23. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20051. | [
"cpe:2.3:a:kofax:power_pdf:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
Subsets and Splits