id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2022-42900
Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read issues when opening crafted FBX files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2021:5171
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
CVE-2021-41121
Memory corruption in Vyper
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
[ "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2004-0781
Cross-site scripting (XSS) vulnerability in list.cgi in the Icecast internal web server (icecast-server) 1.3.12 and earlier allows remote attackers to inject arbitrary web script via the UserAgent parameter.
[ "cpe:2.3:a:icecast:icecast:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:icecast:icecast:1.3.12:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-37344
WordPress Accommodation System plugin <= 1.0.1 - Missing Access Control vulnerability
Missing Access Control vulnerability in PHP Crafts Accommodation System plugin <= 1.0.1 at WordPress.
[ "cpe:2.3:a:accommodation-system_project:accommodation-system:*:*:*:*:*:wordpress:*:*" ]
null
7.6
null
null
GHSA-2p5c-r4xc-mhvw
A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload files and run OS commands by inducing the Administrator user to browse a URL controlled by an attacker.
[]
null
null
null
null
GHSA-hmh4-r5p6-2v44
Post Oak AWAM Bluetooth Field Device 7400v2.08.21.2018, 7800SD.2015.1.16, 2011.3, 7400v2.02.01.2019, and 7800SD.2012.12.5 is vulnerable to injections of operating system commands through timeconfig.py via shell metacharacters in the htmlNtpServer parameter.
[]
null
null
null
null
GHSA-6265-r5jg-4h87
Free Realty before 2.9 allows remote attackers to obtain the full path and other sensitive information via unspecified manipulations that produce an error message.
[]
null
null
null
null
GHSA-w42f-w92v-v257
A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "mobilenumber" to be affected. But it must be assumed that other parameters are affected as well.
[]
5.3
6.3
null
null
GHSA-9qpx-3xf9-26m7
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in falldeaf WP ViewSTL allows DOM-Based XSS.This issue affects WP ViewSTL: from n/a through 1.0.
[]
null
6.5
null
null
GHSA-cj2m-xh7j-q94r
A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.2.0 through 5.2.11 and 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via the "Groups" input while creating or editing User Groups.
[]
null
null
5.4
null
CVE-2014-7701
The DoNotTrackMe - Mobile Privacy (aka com.abine.dnt) application 1.1.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:abine:donottrackme_-_mobile_privacy:1.1.8:*:*:*:*:android:*:*" ]
null
null
null
5.4
RHSA-2003:022
Red Hat Security Advisory: glibc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
CVE-2023-26394
ZDI-CAN-20236: Adobe Substance 3D Stager USD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-hm99-p7fw-6wr3
Opera before 12.10 does not properly implement the Cross-Origin Resource Sharing (CORS) specification, which allows remote attackers to bypass intended page-content restrictions via a crafted request.
[]
null
null
null
null
CVE-2023-41027
Juplink RX4-1500 Credential Disclosure Vulnerability
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
[ "cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*", "cpe:2.3:o:juplink:rx4-1500_firmware:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:juplink:rx4-1500_firmware:1.0.5:*:*:*:*:*:*:*" ]
null
8
null
7.7
GHSA-hjwh-qg8v-mp9r
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can modify admin and other members' passwords.
[]
null
6.5
null
null
GHSA-h3w5-2c4f-pmfr
IBM Sterling External Authentication Server 3.4.3.2, 6.0.2.0, and 6.0.3.0 is vulnerable to path traversals, due to not properly validating RESTAPI configuration data. An authorized user could import invalid data which could be used for an attack. IBM X-Force ID: 220144.
[]
null
null
null
null
GHSA-54gm-34p3-cx2g
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680.
[]
null
null
null
null
CVE-2017-18294
While reading file class type from ELF header, a buffer overread may happen if the ELF file size is less than the size of ELF64 header size in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version FSM9055, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDA660, SDX20.
[ "cpe:2.3:o:qualcomm:fsm9055_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fsm9055:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2022-43476
WordPress Subscribe to Category Plugin <= 2.7.4 is vulnerable to Broken Access Control
Missing Authorization vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Subscribe to Category: from n/a through 2.7.4.
[]
null
4.3
null
null
RHSA-2019:3387
Red Hat Security Advisory: osinfo-db and libosinfo security and bug fix update
Libosinfo: osinfo-install-script option leaks password via command line argument
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
2.8
null
CVE-2013-6017
Cross-site scripting (XSS) vulnerability in Atmail Webmail Server before 7.2 allows remote attackers to inject arbitrary web script or HTML via the body of an e-mail message, as demonstrated by the SRC attribute of an IFRAME element.
[ "cpe:2.3:a:atmail:atmail:*:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.7:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.8:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.10:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.11:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.12:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:6.20.13:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:atmail:atmail:7.1.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-qg8w-4xw5-c8px
Buffer overflow in the DXTTextOutEffect ActiveX control (aka the Text-Effect DXT Filter), as distributed in TextOut.dll 6.0.18.1 and mvtextout.dll, in muvee autoProducer 6.0 and 6.1 allows remote attackers to execute arbitrary code via a long FontSetting property value.
[]
null
null
null
null
GHSA-534x-f3w4-g6x6
Multiple memory leaks in IBM Lotus Notes and Domino Server before 6.5.5 allow attackers to cause a denial of service (memory consumption and crash) via unknown vectors related to (1) unspecified vectors during the SSL handshake (SPR# MKIN67MQVW), (2) the stash file during the SSL handshake (SPR# MKIN693QUT), and possibly other vectors. NOTE: due to insufficient information in the original vendor advisory, it is not clear whether there is an attacker role in other memory leaks that are specified in the advisory.
[]
null
null
null
null
CVE-2020-11949
testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.
[ "cpe:2.3:o:vivotek:cc9381-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cc9381-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9360-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9360-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9368-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9368-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9380-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9380-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9388-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9388-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9360-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9360-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9368-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9368-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9380-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9380-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9388-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9388-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:it9360-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:it9360-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:it9380-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:it9380-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:it9388-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:it9388-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md9560-dh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md9560-dh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md9560-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md9560-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9366-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9366-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9166-hn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9166-hn:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9380-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9380-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:cc8160_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cc8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:cc8160\\(hs\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cc8160\\(hs\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:cc8370-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cc8370-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:cc8371-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cc8371-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:cd8371-hntv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cd8371-hntv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:cd8371-hnvf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:cd8371-hnvf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8166a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8166a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8166a-n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8166a-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8167a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8167a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8169a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8169a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8367a-v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8367a-v:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8369a-v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8369a-v:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd816ba-hf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd816ba-hf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836ba-hvf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836ba-hvf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836ba-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836ba-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836ba-ehvf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836ba-ehvf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd816ba-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd816ba-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836ba-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836ba-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836ba-ehf3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836ba-ehf3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836ba-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836ba-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836ba-hf3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836ba-hf3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836ba-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836ba-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd816b-hf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd816b-hf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd816b-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd816b-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836b-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836b-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836b-ehvf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836b-ehvf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836b-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836b-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd836b-hvf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd836b-hvf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836b-ehf3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836b-ehf3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836b-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836b-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836b-hf3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836b-hf3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836b-hrf3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836b-hrf3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib836b-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib836b-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd816ca-hf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd816ca-hf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd816c-hf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd816c-hf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8182-f1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8182-f1:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8182-f2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8182-f2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8182-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8182-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8382-etv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8382-etv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8382-evf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8382-evf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8382-tv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8382-tv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8382-vf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8382-vf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8382-ef3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8382-ef3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8382-et_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8382-et:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8382-f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8382-f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8382-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8382-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8366-v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8366-v:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8367a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8367a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8369a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8369a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip8166_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip8166:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md8563-deh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md8563-deh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md8563-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md8563-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md8564-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md8564-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md8565-n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md8565-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:vc8101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:vc8101:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:vs8100-v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:vs8100-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip8160_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip8160-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip8160-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8360_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8360:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8360-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8360-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9171-hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9171-hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9181-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9181-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9371-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9371-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9381-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9381-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9371-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9371-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9381-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9381-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9171-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9171-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9181-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9181-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9181-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9181-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9182-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9182-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9381-ehv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9381-ehv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9382-ehv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9382-ehv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9180-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9180-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9582-ehnv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9582-ehnv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9161-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9161-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9361-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9361-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9362-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9362-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9362-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9362-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9363-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9363-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9364-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9364-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9364-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9364-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9363-ehl-v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9363-ehl-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9364-ehl-v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9364-ehl-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9362-eh-v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9362-eh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9364-eh-v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9364-eh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9366-eh-v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9366-eh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9366-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9366-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9366-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9366-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9365-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9365-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:iz9361-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:iz9361-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9187-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9187-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9187-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9187-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9387-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9387-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9387-ehv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9387-ehv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9387-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9387-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9387-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9387-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9387-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9387-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9387-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9387-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9387-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9387-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9387-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9387-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9189-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9189-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9189-hm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9189-hm:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9189-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9189-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9389-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9389-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9389-hmv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9389-hmv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9389-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9389-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9389-ehmv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9389-ehmv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9389-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9389-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9389-ehv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9389-ehv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9389-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9389-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9389-ehm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9389-ehm:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9389-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9389-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9389-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9389-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9389-hm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9389-hm:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9389-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9389-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9165-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9165-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9365-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9365-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9365-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9365-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9365-htvl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9365-htvl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9365-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9365-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9365-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9365-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9165-hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9165-hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9165-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9165-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9165-lpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9165-lpc:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9391-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9391-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9191_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9191:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9191-hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9191-hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9191-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9191-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fe9391-ev_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fe9391-ev:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9391-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9391-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9172-lpc\\(freeway\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9172-lpc\\(freeway\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:it9389-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:it9389-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:it9389-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:it9389-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md9561-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md9561-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:md9581-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:md9581-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ms9390-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ms9390-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:tb9330-e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:tb9330-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:tb9331-e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:tb9331-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:sd9374-ehl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:sd9374-ehl:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9167-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9167-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9167-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9167-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9367-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9367-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9367-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9367-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9367-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9367-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9367-htv\\(epoc\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9367-htv\\(epoc\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9367-eh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9367-eh:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9367-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9367-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9367-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9367-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9367-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9367-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9167-hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9167-hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9167-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9167-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ma9321-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ma9321-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ms9321-ehv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ms9321-ehv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ma9322-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ma9322-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8177-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8177-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8377-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8377-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8177-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8177-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8377-ehtv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8377-ehtv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8377-htv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8377-htv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8179-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8179-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd8379-hv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8379-hv:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8377-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8377-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8377-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8377-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib8377-eht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib8377-eht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9165-ht-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9165-ht-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9365-htv-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9365-htv-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9365-ehtv-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9365-ehtv-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9187-ht-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9187-ht-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9387-htv-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9387-htv-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:fd9387-ehtv-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd9387-ehtv-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9365-eht-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9365-eht-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9365-ht-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9365-ht-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9387-eht-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9387-eht-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ib9387-ht-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ib9387-ht-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9164-ht_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9164-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9164-lpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9164-lpc:-:*:*:*:*:*:*:*", "cpe:2.3:o:vivotek:ip9165-lpc\\(i-cs_kit\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:ip9165-lpc\\(i-cs_kit\\):-:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-r48c-4vfj-h426
collective.dms.basecontent Cross-site Scripting vulnerability
A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability.
[]
5.1
6.1
null
null
GHSA-cvwm-vf9r-8r57
VMware vCenter Server (6.5 prior to 6.5 U1) contains an insecure library loading issue that occurs due to the use of LD_LIBRARY_PATH variable in an unsafe manner. Successful exploitation of this issue may allow unprivileged host users to load a shared library that may lead to privilege escalation.
[]
null
null
8.8
null
GHSA-8rjr-96wc-j9h5
Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges.
[]
null
null
null
null
CVE-2025-22369
Mennekes smart/premium charges systems, Arbitrary file download using ReadFile endpoint
The ReadFile endpoint of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to read arbitrary files from the underlying OS.
[]
7.1
null
null
null
GHSA-rrf8-xx2r-rw7h
Cross-site scripting vulnerability in E-mail of Cybozu Office 10.0.0 to 10.8.4 allows remote attackers to inject an arbitrary script via unspecified vectors.
[]
null
null
null
null
RHSA-2023:2166
Red Hat Security Advisory: freeradius security and bug fix update
freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
CVE-2019-6767
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8163.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7
null
GHSA-p458-c575-82fh
Archer Platform 6.x before 6.14 P1 HF2 (6.14.0.1.2) contains an insecure direct object reference vulnerability. An authenticated malicious user in a multi-instance installation could potentially exploit this vulnerability by manipulating application resource references in user requests to bypass authorization checks, in order to gain execute access to AWF application resources.
[]
null
7.5
null
null
CVE-2011-1682
Multiple cross-site request forgery (CSRF) vulnerabilities in phpList 2.10.13 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) create a list or (2) insert cross-site scripting (XSS) sequences. NOTE: this issue exists because of an incomplete fix for CVE-2011-0748. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.2b:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.3b:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.4b:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.5b:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:tincan:phplist:2.10.12:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2001-0357
FormMail.pl in FormMail 1.6 and earlier allows a remote attacker to send anonymous email (spam) by modifying the recipient and message parameters.
[ "cpe:2.3:a:matt_wright:formmail:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-545v-3hf5-cppv
The Loan Comparison WordPress plugin before 1.5.3 does not validate and escape some of its query parameters before outputting them back in a page/post via an embedded shortcode, which could allow an attacker to inject javascript into into the site via a crafted URL.
[]
null
6.1
null
null
CVE-2021-30954
A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
CVE-2018-21226
Certain NETGEAR devices are affected by authentication bypass. This affects JNR1010v2 before 1.1.0.48, JWNR2010v5 before 1.1.0.48, WNR1000v4 before 1.1.0.48, WNR2020 before 1.1.0.48, and WNR2050 before 1.1.0.48.
[ "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2024-36538
Insecure permissions in chaos-mesh v2.6.3 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token.
[ "cpe:2.3:a:chaos-mesh:chaos-mesh:2.6.3:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-cp2q-q422-62q5
SQL injection vulnerability in viewthread.php in Oxygen (O2PHP Bulletin Board) 1.1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter, a different vector than CVE-2006-1572.
[]
null
null
null
null
CVE-2023-40175
Inconsistent Interpretation of HTTP Requests in puma
Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:puma:puma:-:*:*:*:*:ruby:*:*", "cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*" ]
null
7.3
null
null
CVE-2021-38833
SQL injection vulnerability in PHPGurukul Apartment Visitors Management System (AVMS) v. 1.0 allows attackers to execute arbitrary SQL statements and to gain RCE.
[ "cpe:2.3:a:apartment_visitors_management_system_project:apartment_visitors_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-6w44-6jp6-9hq9
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
GHSA-xc36-3p8q-x8x7
Cross-site scripting (XSS) vulnerability in the setTimeout function in js/jquery.prettyPhoto.js in prettyPhoto 3.1.4 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted PATH_INTO to the default URI.
[]
null
null
null
null
CVE-2016-9193
A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.
[ "cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firesight_system_software:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firesight_system_software:6.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firesight_system_software:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-m45f-4828-5cv5
Regular Expression Denial of Service in highcharts
Withdrawn: Duplicate of GHSA-xmc8-cjfr-phx3
[]
null
null
null
null
GHSA-pq62-7rf2-mhcm
The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered devices on the AirVantage platform when the owner has not disabled the AirVantage Management Service on the devices or registered the device. This could enable an attacker to configure, manage, and execute AT commands on an unsuspecting user’s devices.
[]
null
8.1
null
null
GHSA-vq25-79f6-fj7m
Multiple heap-based buffer overflows in EMC RepliStor 6.2 before SP5 and 6.3 before SP2 allow remote attackers to execute arbitrary code via a crafted message to (1) ctrlservice.exe or (2) rep_srv.exe, possibly related to an integer overflow.
[]
null
null
null
null
CVE-2025-21537
Vulnerability in the PeopleSoft Enterprise FIN Cash Management product of Oracle PeopleSoft (component: Cash Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Cash Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Cash Management accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Cash Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_cash_management:9.2:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-jj6v-6227-3v35
Buffer overflow in an unspecified third-party component in the Batch module for Schneider Electric CitectSCADA before 7.20 and Mitsubishi MX4 SCADA before 7.20 allows local users to execute arbitrary code via a long string in a login sequence.
[]
null
null
null
null
CVE-2020-23705
A global buffer overflow vulnerability in jfif_encode at jfif.c:701 of ffjpeg through 2020-06-22 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.
[ "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-gc36-7w2h-fcxp
The Central East LHIN News (aka com.wCentralEastLHINNews) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2024-40803
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An attacker may be able to cause unexpected app termination.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2009-0642
ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
[ "cpe:2.3:a:ruby-lang:ruby:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-4hgp-5v89-5fhw
A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
[]
null
5.5
null
null
GHSA-jq36-q2p2-4x9m
OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database.
[]
null
7.5
null
null
CVE-2024-33831
A stored cross-site scripting (XSS) vulnerability in the Advanced Expectation - Response module of yapi v1.10.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the body field.
[ "cpe:2.3:a:ymfe:yapi:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
CVE-2017-17553
The Dolphin Browser for Android 12.0.2 suffers from an insecure parsing implementation of the Intent URI scheme. This vulnerability could allow attackers to abuse this implementation through a malicious Intent URI, in order to invoke private Activities within the Dolphin Browser.
[ "cpe:2.3:a:changyou:dolphin:12.0.2:*:*:*:*:android:*:*" ]
null
null
5.3
5
CVE-2009-3864
The Java Update functionality in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22 and JDK and JRE 6 before Update 17, when a non-English version of Windows is used, does not retrieve available new JRE versions, which allows remote attackers to leverage vulnerabilities in older releases of this software, aka Bug Id 6869694.
[ "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update9:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-hh2p-3xp6-2fg7
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when processing a clip with large size values, integer arithmetic overflows, and allocated buffer size will be less than intended buffer size. The following buffer operations will overflow the allocated buffer.
[]
null
null
9.8
null
CVE-2014-9436
Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.
[ "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2015-2429
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow attackers to bypass an application sandbox protection mechanism and perform unspecified registry actions via a crafted application, aka "Windows Registry Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-445q-7482-76fp
In JetBrains TeamCity before 2024.12 backup file exposed user credentials and session cookies
[]
null
5.5
null
null
GHSA-5624-47cx-2qwc
Cloudlog 2.6.15 allows Oqrs.php delete_oqrs_line id SQL injection.
[]
null
7.3
null
null
CVE-2007-0527
SQL injection vulnerability in the is_remembered function in class.login.php in Website Baker 2.6.5 and earlier allows remote attackers to execute arbitrary SQL commands via the REMEMBER_KEY cookie parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:website_baker:website_baker:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-23qq-p4gq-gc2g
WordOps has TOCTOU race condition
WordOps through 3.20.0 has a `wo/cli/plugins/stack_pref.py` TOCTOU race condition because the `conf_path` `os.open` does not use a mode parameter during file creation.
[]
4.1
7.7
null
null
CVE-2018-12027
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said socket are writable by a normal user that is not the application's user, then that non-application user can swap that directory with something else, resulting in traffic being redirected to a non-application user's process through an alternative Unix domain socket.
[ "cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
CVE-2023-45471
The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.
[ "cpe:2.3:a:qad:search_server:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-xq5f-vwcq-j4f3
PHP remote file inclusion vulnerability in resources/includes/popp.config.loader.inc.php in PopSoft Digital PopPhoto Studio 3.5.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter (cfg['popphoto_base_path'] variable). NOTE: Pixaria has notified CVE that "PopPhoto is NOT a product of Pixaria. It was a product of PopSoft Digital and is only hosted by Pixaria as a courtesy... The vulnerability listed was patched by the previous vendor and all previous users have received this update."
[]
null
null
null
null
GHSA-2rrh-8pm2-3q2c
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
[]
null
9.8
null
null
RHSA-2020:4464
Red Hat Security Advisory: libxslt security update
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
6.3
null
CVE-2024-52960
A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
[]
null
4.2
null
null
GHSA-36ww-x63p-687w
Cross-site scripting (XSS) vulnerability in Joomla BSQ Sitestats 1.8.0 and 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header, which is not properly handled when the administrator views site statistics.
[]
null
null
null
null
GHSA-h4xg-qr4x-74g2
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: File Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
5.3
null
CVE-2023-38744
Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
[ "cpe:2.3:h:omron:cj2m_cpu_unit:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h_cpu_unit:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cs_cj_series_ethernet_ip_unit:*:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu35_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu34_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu33_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu31_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cs1w-eip21_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cs1w-eip21:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj1w-eip21_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj1w-eip21:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-455m-q3h9-34pf
Downloads Resources over HTTP in windows-seleniumjar-mirror
Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar-mirror`.RecommendationNo patch is currently available for this vulnerability.Currently, the best mitigation is to download the selenium jar file manually from [seleniumHQ](https://www.seleniumhq.org/download/).Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
null
null
null
null
RHSA-2014:0038
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update
rhev: remote-viewer spice tls-stripping issue
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
GHSA-q4w6-wqgp-2r7m
The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection.
[]
null
7.5
null
null
CVE-2018-4966
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-rxh5-g4jr-gfxr
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M use a linear algorithm for selecting the ID value in the header of a DNS query performed on behalf of the device itself, which makes it easier for remote attackers to spoof responses by including this ID value, as demonstrated by a response containing the address of the firmware update server, a different vulnerability than CVE-2015-2914.
[]
null
null
null
null
GHSA-456x-j3xw-5vwm
SQL injection vulnerability in login.php in TheWebForum (twf) 1.2.1 allows remote attackers to execute arbitrary SQL commands and bypass login authentication via the username parameter (aka the u variable).
[]
null
null
null
null
ICSA-20-343-01
Multiple Embedded TCP/IP Stacks
The function used in uIP-Contiki-OS to process IPv6 extension headers and extension header options can be forced into an infinite loop state due to unchecked header/option lengths.CVE-2020-13984 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function used in uIP-Contiki-OS to decapsulate RPL extension headers does not check for unsafe integer conversion when parsing the values provided in a header, allowing an attacker to corrupt memory.CVE-2020-13985 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function used in uIP-Contiki-OS to decapsulate RPL extension headers does not check the length value of an RPL extension header received, allowing an attacker to cause it to enter an infinite loop.CVE-2020-13986 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in open-iscsi, uIP-Contiki-OS, and uIP that parses incoming transport layer packets (TCP/UDP) does not check the length fields of packet headers against the data available in the packets. Given arbitrary lengths, an out-of-bounds memory read may be performed during the checksum computation.CVE-2020-13987 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in open-iscsi, uIP-Contiki-OS, and uIP that parses the TCP MSS option does not check the validity of the length field of this option, allowing an attacker to force it into an infinite loop when arbitrary TCP MSS values are supplied.CVE-2020-13988 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). When handling TCP urgent data in open-iscsi, uIP-Contiki-OS, and uIP, there are no sanity checks for the value of the urgent data pointer, allowing an attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets.CVE-2020-17437 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). The function in open-iscsi and uIP that reassembles fragmented packets does not validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. This could lead to memory corruption.CVE-2020-17438 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H). Incoming DNS replies in uIP are parsed by the DNS client even if there were no outgoing queries. The DNS transaction ID is not sufficiently random. Provided that the DNS cache is quite small (four entries), this facilitates DNS cache poisoning attacks.CVE-2020-17439 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L). When parsing incoming DNS packets in uIP-Contiki-NG, uIP-Contiki-OS, and uIP, there are no checks whether domain names are null-terminated. This allows an attacker to achieve memory corruption with crafted DNS responses.CVE-2020-17440 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). In picoTCP-NG and picoTCP the payload length field of IPv6 extension headers are not checked against the data available in incoming packets, allowing an attacker to corrupt memory.CVE-2020-17441 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP-NG and picoTCP that processes the hop-by-hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing an attacker to cause the function to enter an infinite loop by supplying arbitrary length values.CVE-2020-17442 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). When processing ICMPv6 echo requests in picoTCP-NG and picoTCP, there are no checks for whether the ICMPv6 header consists of at least 8 bytes (set by RFC443). This leads to the function that creates ICMPv6 echo replies based on a received request with a smaller header to corrupt memory.CVE-2020-17443 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in picoTCP-NG and picoTCP that processes IPv6 headers does not check the lengths of extension header options, allowing an attacker to force this function into an infinite loop with crafted length values.CVE-2020-17444 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP-NG and picoTCP that processes the IPv6 destination options extension header does not check the validity of its options lengths, allowing an attacker to corrupt memory and/or put the function into an infinite loop with crafted length values.CVE-2020-17445 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in FNET does not check whether domain names are null terminated when parsing Link-local Multicast Name Resolution (LLMNR) requests. This may allow an attacker to read out of bounds.CVE-2020-17467 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in FNET that processes the IPv6 hop-by-hop extension header does not check the validity of its options lengths, allowing an attacker to corrupt memory.CVE-2020-17468 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The IPv6 packet reassembly function in FNET does not check whether the received fragments are properly aligned in memory, allowing an attacker to perform memory corruption with crafted IPv6 fragmented packets.CVE-2020-17469 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in FNET that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they will be always set to 1), facilitating DNS cache poisoning attacks.CVE-2020-17470 has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N). The function in uIP-Contiki-NG, uIP-Contiki-OS, and uIP that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, which may allow an attacker to corrupt memory.CVE-2020-24334 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in uIP-Contiki-NG, uIP-Contiki-OS, and uIP that parses domain names lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.CVE-2020-24335 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in uIP-Contiki-NG and uIP-Contiki-OS for parsing DNS records in DNS response packets sent over NAT64 does not validate the length field of the response records, allowing an attacker to corrupt memory.CVE-2020-24336 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The function in picoTCP-NG and picoTCP that processes TCP options does not validate their lengths, allowing an attacker to put the function into an infinite loop with uncommon/unsupported TCP options that have crafted length values.CVE-2020-24337 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP and picoTCP-NG that parses domain names lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.CVE-2020-24338 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The function in picoTCP and picoTCP-NG that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing an attacker to perform memory corruption.CVE-2020-24339 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in picoTCP and picoTCP-NG that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing an attacker to perform memory corruption.CVE-2020-24340 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The TCP input data processing function in picoTCP-NG and picoTCP does not validate the length of incoming TCP packets, allowing an attacker to read out of bounds and perform memory corruption.CVE-2020-24341 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). When parsing incoming DNS packets in FNET,there are no checks whether domain names are null-terminated. This may allow an attacker to achieve memory corruption and/or memory leak.CVE-2020-24383 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25107 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25108 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25109 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25110 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). The function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.CVE-2020-25111 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Vulnerabilities in uIP-Contiki-OS (EOL) provide insufficient checks for the IPv4/IPv6 header length and inconsistent checks for the IPv6 header extension lengths, which may allow an attacker to corrupt memory.CVE-2020-25112 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
8.1
null
CVE-2025-1052
Mintty Sixel Image Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Mintty Sixel Image Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mintty. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of sixel images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-23382.
[]
null
null
8.8
null
CVE-2016-1816
IOAcceleratorFamily in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-ff4q-64jc-gx98
IdentityServer Open Redirect vulnerability
ImpactIt is possible for an attacker to craft malicious Urls that certain functions in IdentityServer will incorrectly treat as local and trusted. If such a Url is returned as a redirect, some browsers will follow it to a third-party, untrusted site._Note: by itself, this vulnerability does **not** allow an attacker to obtain user credentials, authorization codes, access tokens, refresh tokens, or identity tokens. An attacker could however exploit this vulnerability as part of a phishing attack designed to steal user credentials._Affected MethodsIn the `DefaultIdentityServerInteractionService`, the `GetAuthorizationContextAsync` method may return non-null and the `IsValidReturnUrl` method may return true for malicious Urls, indicating incorrectly that they can be safely redirected to._UI code calling these two methods is the most commonly used code path that will expose the vulnerability. The default UI templates rely on this behavior in the Login, Challenge, Consent, and Account Creation pages. Customized user interface code might also rely on this behavior. The following uncommonly used APIs are also vulnerable:_The `ServerUrlExtensions.GetIdentityServerRelativeUrl`, `ReturnUrlParser.ParseAsync` and `OidcReturnUrlParser.ParseAsync` methods may incorrectly return non-null, and the `ReturnUrlParser.IsValidReturnUrl` and `OidcReturnUrlParser.IsValidReturnUrl` methods may incorrectly return true for malicious Urls.PatchesThis vulnerability is fixed in the following versions of Duende.IdentityServer:7.0.66.3.106.2.56.1.86.0.5Duende.IdentityServer 5.1 and earlier and all versions of IdentityServer4 are no longer supported and will not be receiving updates.WorkaroundsIf upgrading is not possible, use `IUrlHelper.IsLocalUrl` from ASP.NET Core 5.0 or later to validate return Urls in user interface code in the IdentityServer host.
[]
5.1
4.7
null
null
CVE-2024-2561
74CMS Company Logo Index.php#sendCompanyLogo unrestricted upload
A vulnerability, which was classified as critical, has been found in 74CMS 3.28.0. Affected by this issue is the function sendCompanyLogo of the file /controller/company/Index.php#sendCompanyLogo of the component Company Logo Handler. The manipulation of the argument imgBase64 leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257060.
[ "cpe:2.3:a:74cms:74cms:3.28.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-76h3-fc3v-q78j
An arbitrary file upload vulnerability in the component /php_action/editProductImage.php of Billing System Project v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
[]
null
7.2
null
null
RHSA-2024:3575
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 enhancement and security update
keycloak: Unguarded admin REST API endpoints allows low privilege users to use administrative functionalities keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
[ "cpe:/a:redhat:build_keycloak:22" ]
null
7.5
null
null
GHSA-4w94-8ff7-4xmw
An improper authentication issue was discovered in Johnson & Johnson Ethicon Endo-Surgery Generator Gen11, all versions released before November 29, 2017. The security authentication mechanism used between the Ethicon Endo-Surgery Generator Gen11 and single-patient use products can be bypassed, allowing for unauthorized devices to be connected to the generator, which could result in a loss of integrity or availability.
[]
null
null
4.8
null
CVE-2024-28226
Fs has an improper input validation vulnerability
in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input.
[]
null
8.1
null
null
CVE-2023-30216
Insecure permissions in the updateUserInfo function of newbee-mall before commit 1f2c2dfy allows attackers to obtain user account information.
[ "cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2024-23940
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system.
[ "cpe:2.3:a:trendmicro:air_support:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:antivirus_\\+_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:internet_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:maximum_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:premium_security:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2014-4875
CreateBossCredentials.jar in Toshiba CHEC before 6.6 build 4014 and 6.7 before build 4329 contains a hardcoded AES key, which allows attackers to discover Back Office System Server (BOSS) DB2 database credentials by leveraging knowledge of this key in conjunction with bossinfo.pro read access.
[ "cpe:2.3:a:toshiba:chec:*:*:*:*:*:*:*:*", "cpe:2.3:a:toshiba:chec:6.7:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-f432-537h-hwj6
A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
[]
null
null
6.6
null
CVE-2022-24788
Buffer overflow in Vyper
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue.
[ "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2021-22916
In Brave Desktop between versions 1.17 and 1.26.60, when adblocking is enabled and a proxy browser extension is installed, the CNAME adblocking feature issues DNS requests that used the system DNS settings instead of the extension's proxy settings, resulting in possible information disclosure.
[ "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
CVE-2016-2952
IBM BigFix Remote Control before 9.1.3 does not enable the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by leveraging use of HTTP.
[ "cpe:2.3:a:ibm:bigfix_remote_control:*:*:*:*:*:*:*:*" ]
null
null
3.7
4.3
GHSA-9gcc-m7qq-467x
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Artem Abramovich Art Decoration Shortcode plugin <= 1.5.6 versions.
[]
null
6.5
null
null
CVE-2023-44416
D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability
D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622. Authentication is required to exploit this vulnerability. The specific flaw exists within the CLI service, which listens on TCP port 23. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20051.
[ "cpe:2.3:a:kofax:power_pdf:*:*:*:*:*:*:*:*" ]
null
null
6.8
null